-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corporation, Bedford, MA, MTR-3153 Rev. 1 (ESD-TR-76-372)
-
K. J. Biba, "Integrity considerations for secure computer systems," MITRE Corporation, Bedford, MA, MTR-3153 Rev. 1 (ESD-TR-76-372), 1976.
-
(1976)
-
-
Biba, K.J.1
-
5
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. IT-29, pp. 198-208, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
6
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, "A classification of security properties for process algebras," J. Comput. Security, vol. 3, pp. 5-33, 1995.
-
(1995)
J. Comput. Security
, vol.3
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
8
-
-
0030680628
-
The specification and implementation of commercial security requirements including dynamic segregation of duties
-
____, "The specification and implementation of commercial security requirements including dynamic segregation of duties," in ACM Conf. Computer Communications Security, 1997, pp. 125-134.
-
ACM Conf. Computer Communications Security, 1997
, pp. 125-134
-
-
Foley, S.N.1
-
11
-
-
0031382767
-
Using type enforcement to assure a configurable guard
-
P. Greve, J. Hoffman, and R. E. Smith, "Using type enforcement to assure a configurable guard," in Proc. 13th Ann. Computer Security Applications Conf., 1997, pp. 146-153.
-
Proc. 13th Ann. Computer Security Applications Conf., 1997
, pp. 146-153
-
-
Greve, P.1
Hoffman, J.2
Smith, R.E.3
-
13
-
-
0012798495
-
The varieties of refinement
-
J. M. Morris and R. C. Shaw, Eds.
-
____, "The varieties of refinement," in Proc. 4th Refinement Workshop, J. M. Morris and R. C. Shaw, Eds., 1991, pp. 441-455.
-
(1991)
Proc. 4th Refinement Workshop
, pp. 441-455
-
-
Jacob, J.L.1
-
14
-
-
84974756266
-
Basic theorems about security
-
____, "Basic theorems about security," J. Comput. Security, vol. 1, no. 4, pp. 385-411, 1992.
-
(1992)
J. Comput. Security
, vol.1
, Issue.4
, pp. 385-411
-
-
Jacob, J.L.1
-
15
-
-
0030677524
-
A logical language for expressing authorizations
-
S. Jajodia et al., "A logical language for expressing authorizations," in Proc. Symp. Security Privacy, 1997, pp. 31-42.
-
Proc. Symp. Security Privacy, 1997
, pp. 31-42
-
-
Jajodia, S.1
-
17
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," in Proc. IEEE Symp. Research Security and Privacy, 1994, pp. 79-93.
-
Proc. IEEE Symp. Research Security and Privacy, 1994
, pp. 79-93
-
-
McLean, J.1
-
18
-
-
0012842372
-
Later developments at Cambridge: Titan, CAP and the Cambridge ring
-
R. Needham, "Later developments at Cambridge: Titan, CAP and the Cambridge ring," Ann. History Comput., vol. 14, pp. 57-58, 1992.
-
(1992)
Ann. History Comput.
, vol.14
, pp. 57-58
-
-
Needham, R.1
-
19
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson, "The inductive approach to verifying cryptographic protocols," J. Comput. Security, vol. 6, pp. 85-128, 1998.
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
22
-
-
0030232849
-
Non-interference through determinism
-
A. W. Roscoe, J. C. P. Woodcock, and L. Wulf, "Non-interference through determinism," J. Comput. Security, vol. 4, 1995.
-
(1995)
J. Comput. Security
, vol.4
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
23
-
-
0012886288
-
Mathematical models of computer security
-
New York: Springer-Verlag
-
P. Y. A. Ryan, "Mathematical models of computer security," in Foundations of Security Analysis and Design. New York: Springer-Verlag, 2000.
-
(2000)
Foundations of Security Analysis and Design
-
-
Ryan, P.Y.A.1
-
26
-
-
0030086382
-
Role based access control models
-
____, "Role based access control models," IEEE Computer, vol. pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
-
27
-
-
84856166141
-
The incorporation of control principles into access control policies
-
A. Schaad and D. Moffett, "The incorporation of control principles into access control policies," in Workshop on Policies for Distributed Systems and Networks, Bristol, U.K., 2001.
-
Workshop on Policies for Distributed Systems and Networks, Bristol, U.K., 2001
-
-
Schaad, A.1
Moffett, D.2
-
30
-
-
4244073835
-
Safety through security
-
Ph.D. dissertation, Oxford Univ., Comput. Lab.
-
A. C. Simpson, "Safety through security," Ph.D. dissertation, Oxford Univ., Comput. Lab., 1996.
-
(1996)
-
-
Simpson, A.C.1
-
32
-
-
0012795337
-
Integrity-oriented control objectives: Proposed revisions to the trusted computer system evaluation criteria (TCSEC)
-
U. S. Dept. Defense, DOD 5200.28-STD
-
"Integrity-Oriented Control Objectives: Proposed Revisions to the Trusted Computer System Evaluation Criteria (TCSEC)," U. S. Dept. Defense, DOD 5200.28-STD, 1991.
-
(1991)
-
-
-
33
-
-
4243267407
-
Specifications for fault-tolerance
-
Odyssey Research Associates, Ithaca, NY, 19-3
-
D. Weber, "Specifications for Fault-Tolerance," Odyssey Research Associates, Ithaca, NY, 19-3, 1988.
-
(1988)
-
-
Weber, D.1
|