-
1
-
-
0242403868
-
Generalized framework for access control: Towards prototyping the ORGCON policy
-
M. D. Abrams, J. Heaney, O. King, L. J. LaPadula, M. Lazear, and I. M. Olson. Generalized framework for access control: Towards prototyping the ORGCON policy. In Proceedings of the 14th National Computer Security Conference, Washington, D.C., October 1991.
-
Proceedings of the 14th National Computer Security Conference, Washington, D.C., October 1991
-
-
Abrams, M.D.1
Heaney, J.2
King, O.3
LaPadula, L.J.4
Lazear, M.5
Olson, I.M.6
-
2
-
-
0242655641
-
-
ForeScout. ActiveScout. World Wide Web
-
ForeScout. ActiveScout. World Wide Web, 2002. http://www.forescout.com/activescout.html.
-
(2002)
-
-
-
3
-
-
0026837237
-
Integration of user authentication and access control
-
L. Harn and H. Lin. Integration of user authentication and access control. In IEE Proceedings-E, volume 139, number 2, pages 139-143, 1992.
-
(1992)
IEE Proceedings-E
, vol.139
, Issue.2
, pp. 139-143
-
-
Harn, L.1
Lin, H.2
-
4
-
-
0242403867
-
-
Internet Assigned Numbers Authority. Port numbers. World Wide Web
-
Internet Assigned Numbers Authority. Port numbers. World Wide Web. http://www.iana.org/assignments/port-numbers.
-
-
-
-
7
-
-
0003004128
-
A dynamic access control mechanism in information protection systems
-
March
-
C. H. Lin, R. C. T. Lee, and C. C. Chang. A dynamic access control mechanism in information protection systems. Journal of Information Science and Engineering, 6(1):25-35, March 1990.
-
(1990)
Journal of Information Science and Engineering
, vol.6
, Issue.1
, pp. 25-35
-
-
Lin, C.H.1
Lee, R.C.T.2
Chang, C.C.3
-
8
-
-
0003871309
-
Network time protocol (version 3) specification, implementation and analysis
-
RFC 1305, March
-
D. L. Mills. Network Time Protocol (version 3) specification, implementation and analysis. RFC 1305, March 1992.
-
(1992)
-
-
Mills, D.L.1
-
9
-
-
0242314805
-
The spread of the Sapphire/Slammer worm
-
Technical report, January
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the Sapphire/Slammer worm. Technical report, January 2003. http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html.
-
(2003)
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
10
-
-
0242571322
-
Dynamic access control policies in Seraphim
-
Technical Report UIUCDCS-R-2002-2260, Computer Science Department, University of Illinois at Urbana-Champaign, February
-
P. Naldurg and R. H. Campbell. Dynamic access control policies in Seraphim. Technical Report UIUCDCS-R-2002-2260, Computer Science Department, University of Illinois at Urbana-Champaign, February 2002.
-
(2002)
-
-
Naldurg, P.1
Campbell, R.H.2
-
11
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
0012109964
-
Know your enemy: Passive fingerprinting
-
World Wide Web, March
-
L. Spitzner. Know your enemy: Passive fingerprinting. World Wide Web, March 2002. http://project.honeynet.org/papers/finger/.
-
(2002)
-
-
Spitzner, L.1
-
13
-
-
85084162258
-
How to own the internet in your spare time
-
S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium (Security '02), San Francisco, CA, August 2002.
-
Proceedings of the 11th USENIX Security Symposium (Security '02), San Francisco, CA, August 2002
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
14
-
-
84988603769
-
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
-
Little Compton, RI
-
R. K. Thomas and R. S. Sandhu. Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In Proceedings on the 1992-1993 Workshop on New Security Paradigms, pages 138-142, Little Compton, RI, 1993.
-
(1993)
Proceedings on the 1992-1993 Workshop on New Security Paradigms
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
17
-
-
0242571321
-
Insider threat to security may be harder to detect, experts say
-
April 12
-
D. Verton. Insider threat to security may be harder to detect, experts say. Computerworld, April 12, 2002.
-
(2002)
Computerworld
-
-
Verton, D.1
|