-
1
-
-
0003400257
-
-
M74-244, Mitre Corporation, Bellford, MA
-
Bell, D.E. and Lapadula, L.J. (1975) Secure Computer Systems: Mathematical Foundations and Model, M74-244, Mitre Corporation, Bellford, MA.
-
(1975)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.E.1
Lapadula, L.J.2
-
2
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.E. (1976), "A lattice model of secure information flow", Communications of the ACM, Vol. 19, No. 5, pp. 236-43.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
3
-
-
0017517624
-
Certification of programs for secure information flow
-
Dennning, D.E. and Denning, P.J. (1997), "Certification of programs for secure information flow", Communications of the ACM, Vol. 20, No. 7, pp. 504-13.
-
(1997)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Dennning, D.E.1
Denning, P.J.2
-
4
-
-
0002262722
-
Role based access control: Features and motivation
-
IEEE Computer Society Press, Piscataway, NJ
-
Ferraiolo, D., Cugini, J. and Kulin, D.R. (1995), "Role based access control: features and motivation", Annual Computer Security Applications Conference, IEEE Computer Society Press, Piscataway, NJ.
-
(1995)
Annual Computer Security Applications Conference
-
-
Ferraiolo, D.1
Cugini, J.2
Kulin, D.R.3
-
5
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
IEEE Computer Society Press, Piscataway, NJ
-
Jajodia, S. and Kogan, B. "Integrating an object-oriented data model with multilevel security", Proceedings of 1990 Symposium on Res. in Security and Privacy, IEEE Computer Society Press, Piscataway, NJ, pp. 76-85.
-
(1990)
Proceedings of 1990 Symposium on Res. in Security and Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
-
6
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B.W. (1973) "A note on the confinement problem", Communications of ACM, Vol. 16 No. 10, pp. 613-5.
-
(1973)
Communications of ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
8
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S., Sandhu, R. and Munawer (2000) "Configuring role-based access control to enforce mandatory and discretionary access control policies", ACM Transactions on Information and System Security, Vol. 3 No. 2, pp. 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer3
-
9
-
-
0034545418
-
Information flow in inference for free
-
New York, NY
-
Potter, F. and conchon, S. (2000) "Information flow in inference for free", ICFP00, ACM, New York, NY, pp. 46-57.
-
(2000)
ICFP00, ACM
, pp. 46-57
-
-
Potter, F.1
Conchon, S.2
-
10
-
-
50249183308
-
Role hierarchies and constraints for lattice, based access control
-
Springer Verlag, Lecture Notes 1146
-
Sandhu, R. (1996c) "Role hierarchies and constraints for lattice, based access control", Computer Security-ESORICS 96, Springer Verlag, Lecture Notes 1146, pp. 65-79.
-
(1996)
Computer Security-ESORICS 96
, pp. 65-79
-
-
Sandhu, R.1
-
11
-
-
0031341651
-
The ARBAC97 model for role-based administration of roles: Preliminary description and outline
-
Sandhu, R. and Bhamidipati, V. (1997), "The ARBAC97 model for role-based administration of roles: preliminary description and outline", Second ACM Workshop on Role-based Access Control, Fairfax, VA, pp. 41-54.
-
(1997)
Second ACM Workshop on Role-Based Access Control, Fairfax, VA
, pp. 41-54
-
-
Sandhu, R.1
Bhamidipati, V.2
-
12
-
-
85010811724
-
-
Sandhu, R., Coyne, F.J. and Youman, C.E. (Eds.)
-
Sandhu, R., Coyne, F.J. and Youman, C.E. (Eds.) (1996a), Proceedings of the First ACM Workshop on Role-based Access Control, ACM. New York, NY.
-
(1996)
Proceedings of the First ACM Workshop on Role-Based Access Control, ACM. New York, NY.
-
-
-
13
-
-
0030086382
-
Role based access control models
-
Sandhu, R., Coyne, E.J., Feinstein, H.L. and Youman, C.E. (1996b), "Role based access control models", IEEE Computer, Vol. 29, No. 2, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0034835461
-
A new type system for secure information flow
-
Smith, G. (2001), "A new type system for secure information flow", Proceedings of 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, pp. 115-25.
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia
, pp. 115-125
-
-
Smith, G.1
-
15
-
-
0031379041
-
A role-based access control model for protection domain derivation and management
-
Trent Jaeger, F. (1997), "A role-based access control model for protection domain derivation and management", 2nd ACM Workshop on Role-based Access Control, Fairfax, VA, November, pp. 95-108.
-
(1997)
2nd ACM Workshop on Role-Based Access Control, Fairfax, VA, November
, pp. 95-108
-
-
Trent Jaeger, F.1
-
16
-
-
85010799770
-
-
UML Resource Center (n.dd.), United Modeling Language, UML Resource Center
-
UML Resource Center (n.dd.), United Modeling Language, UML Resource Center, available at: www.rational.com/UML/
-
-
-
-
17
-
-
0034851086
-
Specification and enforcement of object-oriented RBAC model
-
Zhang, C.N. and Yang, C. (2001a), "Specification and enforcement of object-oriented RBAC model", 2001 IEEE Canadian Conference on Electrical and Computer Engineering, Toronto, pp. 128-35.
-
(2001)
2001 IEEE Canadian Conference on Electrical and Computer Engineering, Toronto
, pp. 128-135
-
-
Zhang, C.N.1
Yang, C.2
-
18
-
-
71449117058
-
An object-oriented RBAC model for distributed systems
-
Zhang, C.N. and Yang, C. (2001b), "An object-oriented RBAC model for distributed systems", 2001 IEEE/IFIP Conference on Software Architecture, WICSA 2001, pp. 24-32.
-
(2001)
2001 IEEE/IFIP Conference on Software Architecture, WICSA 2001
, pp. 24-32
-
-
Zhang, C.N.1
Yang, C.2
|