-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE, November
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. Report MTR 2547 v2, MITRE, November 1973.
-
(1973)
Report MTR 2547 v2
-
-
Bell, D.1
LaPadula, L.2
-
2
-
-
0036041841
-
Proxy-based security protocols in networked mobile devices
-
March (to appear)
-
M. Burnside, D. Clarke, T. Mills, D. Devadas, and R. Rivest. Proxy-based security protocols in networked mobile devices. In Proceedings of the ACM Symposium on Applied Computing, March 2002. (to appear).
-
(2002)
Proceedings of the ACM Symposium on Applied Computing
-
-
Burnside, M.1
Clarke, D.2
Mills, T.3
Devadas, D.4
Rivest, R.5
-
3
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
D. Clark and D. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
4
-
-
0006010789
-
A calculus of information flow
-
C. O'Halloran. A calculus of information flow. In ESORICS 90, pages 147-159, 1990.
-
(1990)
ESORICS 90
, pp. 147-159
-
-
O'Halloran, C.1
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
7
-
-
0016081585
-
Capability-based adressing
-
July
-
R. S. Fabry. Capability-based adressing. Communications of the ACM, 17(7):403-412, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 403-412
-
-
Fabry, R.S.1
-
9
-
-
0029719670
-
Hidden software capabilities
-
D. Hagimont, J. Mossiere, X. R. de Pina, and F. Saunier. Hidden software capabilities. In International Conference on Distributed Computing Systems, pages 282-289, 1996.
-
(1996)
International Conference on Distributed Computing Systems
, pp. 282-289
-
-
Hagimont, D.1
Mossiere, J.2
De Pina, X.R.3
Saunier, F.4
-
10
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
J. Peckham, editor, ACM Press
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In J. Peckham, editor, SIGMOD International Conference on Management of Data, pages 474-485. ACM Press, 1997.
-
(1997)
SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
13
-
-
0021197579
-
An augmented capability architecture to support lattice security and traceability of access
-
P. A. Karger and A. J. Herbert. An augmented capability architecture to support lattice security and traceability of access. In IEEE Symposium on Security and Privacy, pages 2-12, 1984.
-
(1984)
IEEE Symposium on Security and Privacy
, pp. 2-12
-
-
Karger, P.A.1
Herbert, A.J.2
-
14
-
-
0003237987
-
The kerberos network authentication service (v5)
-
Digital Equipment Corporation/ISI, September
-
J. Kohl and C. Neuman. The kerberos network authentication service (v5). RFC 1510, Digital Equipment Corporation/ISI, September 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
16
-
-
0038663254
-
Management policy service for distributed systems
-
Imperial College, London
-
D. A. Marriott, M. S. Sloman, and N. Yialelis. Management policy service for distributed systems. Technical Report DoC 95/10, Imperial College, London, 1995.
-
(1995)
Technical Report DoC
, vol.95
, Issue.10
-
-
Marriott, D.A.1
Sloman, M.S.2
Yialelis, N.3
-
22
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, and H. L. F. and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Charles, H.L.F.3
Youman, E.4
-
23
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish). Lecture Notes in Computer Science, 809:191-204, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
25
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX
-
B. C. N. J. G. Steiner and J. I. Schiller, Kerberos: An authentication service for open network systems. In Winter 1988 USENIX Conference, pages 191-201, Dallas, TX, 1988.
-
(1988)
Winter 1988 USENIX Conference
, pp. 191-201
-
-
Steiner, B.C.N.J.G.1
Schiller, J.I.2
-
26
-
-
0037986859
-
The iona iportal application server
-
IONA Technologies
-
I. Technologies. The iona iportal application server. Technical report, IONA Technologies, 1999.
-
(1999)
Technical Report
-
-
-
27
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
M. Thompson, S. M. W Johnston, G. Hoo, K. Jackson, and A. Essiari. Certificate-based access control for widely distributed resources. In Proceedings of the Eighth USENIX Security Symposium, pages 215-228, 1999.
-
(1999)
Proceedings of the Eighth USENIX Security Symposium
, pp. 215-228
-
-
Thompson, M.1
Johnston, S.M.W.2
Hoo, G.3
Jackson, K.4
Essiari, A.5
-
28
-
-
0038324596
-
Active capability: An application specific security and protection model
-
University of Illinois at Urbana-Champaign
-
W. L. Tin Qian. Active capability: An application specific security and protection model. Technical report, University of Illinois at Urbana-Champaign, 1996.
-
(1996)
Technical Report
-
-
Tin Qian, W.L.1
|