-
1
-
-
4243739157
-
Advanced concept technology demonstration, management plan
-
NATO Interoperability from; PEO C3S HTIO, Fort Monmoth, NJ
-
NATO Interoperability from "Advanced Concept Technology Demonstration, Management Plan," PEO C3S HTIO, Fort Monmoth, NJ. 1999.
-
(1999)
-
-
-
2
-
-
0242445274
-
ABCS ITDS
-
MITRE Corporation presentation, NJ, Oct.
-
P. Barr, "ABCS ITDS", MITRE Corporation presentation, NJ, Oct. 1998.
-
(1998)
-
-
Barr, P.1
-
3
-
-
0003400257
-
Secure computer systems: Mathematical foundations model
-
M74-244, Mitre Corporation, Bedford, Massachusetts
-
D. Bell and L. LaPadula, "Secure Computer Systems: Mathematical Foundations Model." M74-244, Mitre Corporation, Bedford, Massachusetts, 1975.
-
(1975)
-
-
Bell, D.1
LaPadula, L.2
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb.
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Trans. Info. Syst. Security, Vol. 2, No. 1, Feb. 1999.
-
(1999)
ACM Trans. Info. Syst. Security
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. Bonatti, and E. Ferrari, "TRBAC: A Temporal Role-Based Access Control Model," Proc. of the Fifth ACM Workshop on Role-based Access Control, Berlin Germany, July 2000.
-
Proc. of the Fifth ACM Workshop on Role-Based Access Control, Berlin Germany, July 2000
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
7
-
-
24544472638
-
Command, control, communications, and computers interoperability for coalition warfare, advanced concept technology demonstration, management plan
-
Prepared by PEO C3S HTIO; Ver. 1.2
-
Prepared by PEO C3S HTIO, "Command, Control, Communications, and Computers Interoperability for Coalition Warfare, Advanced Concept Technology Demonstration, Management Plan," Ver. 1.2, 1999.
-
(1999)
-
-
-
8
-
-
0242445275
-
XML-MTF, a military XML vocabulary
-
The MITRE Corporation
-
M. Cokus, "XML-MTF, A Military XML Vocabulary," The MITRE Corporation, 2001.
-
(2001)
-
-
Cokus, M.1
-
9
-
-
0242613516
-
2000 project summary, flexible coalition policies for secure information sharing
-
DARPA ITO Sponsored Research, Spring, Kohout, Yates; Verdian-PSR
-
DARPA ITO Sponsored Research, Spring, Kohout, Yates, "2000 Project Summary, Flexible Coalition Policies for Secure Information Sharing," Verdian-PSR, 2000.
-
(2000)
-
-
-
10
-
-
4243922486
-
Integrated security services for dynamic coalition management
-
DARPA ACT Program March
-
J. Baras, V. Gligor, and R. Poovendran, "Integrated Security Services for Dynamic Coalition Management," DARPA ACT Program March 2001.
-
(2001)
-
-
Baras, J.1
Gligor, V.2
Poovendran, R.3
-
11
-
-
0031361985
-
Towards a definitive paradigm for security in object-oriented systems and applications
-
S. Demurjian and T.C. Ting, "Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications," Journal of Computer Security, Vol. 5, No. 4, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.4
-
-
Demurjian, S.1
Ting, T.C.2
-
12
-
-
0242613520
-
A user role-based security model for a distributed environment
-
J. Therrien (ed.), Kluwer
-
S. Demurjian, T.C. Ting, H. Ren, J. Balthazar, C. Phillips, and P. Barr, "A User Role-Based Security Model for a Distributed Environment," Research Advances in Database and Information Systems Security, J. Therrien (ed.), Kluwer, 2001.
-
(2001)
Research Advances in Database and Information Systems Security
-
-
Demurjian, S.1
Ting, T.C.2
Ren, H.3
Balthazar, J.4
Phillips, C.5
Barr, P.6
-
13
-
-
0003969635
-
Department of defense trusted computer systems evaluation criteria
-
Department of Defense Directive 5200.28-STD; December 1985, Authorized by DoD Directive 5200.28, Dec.
-
Department of Defense Directive 5200.28-STD, "Department of Defense Trusted Computer Systems Evaluation Criteria," December 1985, Authorized by DoD Directive 5200.28, Dec. 1972.
-
(1972)
-
-
-
14
-
-
0008691175
-
Security requirements for automated information systems (AIS)
-
Department of Defense Directive 5200.28; March
-
Department of Defense Directive 5200.28, "Security Requirements for Automated Information Systems (AIS)," March 1988.
-
(1988)
-
-
-
15
-
-
24544454299
-
Data standardization procedures
-
Department of Defense Directive 8320.1-M-1, Department of Defense; March 1996
-
Department of Defense Directive 8320.1-M-1, Department of Defense, "Data Standardization Procedures," March 1996. 1996. http://jcs.mil/htdocs/teinfo/software/8320.html
-
(1996)
-
-
-
16
-
-
24544447706
-
National security information
-
Executive Order 12356; The White House, Apr.
-
R. Reagan, Executive Order 12356, "National Security Information," The White House, Apr. 1982.
-
(1982)
-
-
Reagan, R.1
-
17
-
-
0242445284
-
The role control center: An implementation of role-based access control on identity-based systems
-
NIST White Paper
-
D. Ferrailo, "The Role Control Center: An Implementation of Role-Based Access Control on Identity-Based Systems," NIST White Paper, 2000.
-
(2000)
-
-
Ferrailo, D.1
-
18
-
-
0242528827
-
An argument for the role-based access control model
-
D. Ferraiolo, "An Argument For The Role-Based Access Control Model," Proc. of Sixth ACM Symp. on Access Control Models and Technologies, Chantilly, VA, USA, May 2001.
-
Proc. of Sixth ACM Symp. on Access Control Models and Technologies, Chantilly, VA, USA, May 2001
-
-
Ferraiolo, D.1
-
19
-
-
24544463961
-
Global command and control center
-
Joint Operational Support Center; DISA
-
Joint Operational Support Center. "Global Command and Control Center," DISA 1999. http://gccs.disa.mil/gccs/
-
(1999)
-
-
-
20
-
-
0242528825
-
On the increasing importance of constraints
-
T. Jaeger "On the Increasing Importance of Constraints," Proc. of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, Oct. 1999.
-
Proc. of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, Oct. 1999
-
-
Jaeger, T.1
-
21
-
-
0242445276
-
General instructions
-
Joint Information Exchange Operations, Department of Defense Handbook, March
-
JIEO Handbook 9000, Chapter One, "General Instructions," Joint Information Exchange Operations, Department of Defense Handbook, March 2000.
-
(2000)
JIEO Handbook 9000, Chapter One
-
-
-
22
-
-
24544446391
-
Adaptive network defense, dynamic virtual private network
-
Networks Associates Technology, Inc., NAI Labs
-
D. Kindred and K. Djahandari, "Adaptive Network Defense, Dynamic Virtual Private Network," Networks Associates Technology, Inc., NAI Labs, 2001, see http://www.pgp.com/research/nailabs/adaptives-network/dynamic-virtual
-
(2001)
-
-
Kindred, D.1
Djahandari, K.2
-
24
-
-
0242528824
-
Army modernization: Digitization and transformation overview
-
briefing at Pentagon, April
-
S. Levine, "Army Modernization: Digitization and Transformation Overview," briefing at Pentagon, April 2000.
-
(2000)
-
-
Levine, S.1
-
26
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control To Enforce Mandatory And Discretionary Access Control Policies," ACM Trans. Info. Syst. Security, Vol. 3, No. 2, 2000.
-
(2000)
ACM Trans. Info. Syst. Security
, vol.3
, Issue.2
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
27
-
-
0242445279
-
Message text formats-a solution to the problem of interoperability
-
March
-
W. Peach, "Message Text Formats-A Solution to the Problem of Interoperability," Journal of Battlefield Technology, Vol. 2, March 1999.
-
(1999)
Journal of Battlefield Technology
, vol.2
-
-
Peach, W.1
-
29
-
-
24544445642
-
Toward information assurance in dynamic coalitions
-
Comp. Sci. and Engr. Dept., Univ. of Conn. (CSE-TR-02-3), February
-
C. Phillips, S. Demurjian, and T.C. Ting, "Toward Information Assurance in Dynamic Coalitions", Comp. Sci. and Engr. Dept., Univ. of Conn. (CSE-TR-02-3), February 2002.
-
(2002)
-
-
Phillips, C.1
Demurjian, S.2
Ting, T.C.3
-
30
-
-
0037848141
-
Access control: Policies, models, architectures, and mechanisms
-
Italy, Sept.
-
P. Samarati, "Access Control: Policies, Models, Architectures, and Mechanisms," FOSAD, Italy, Sept. 2000.
-
(2000)
FOSAD
-
-
Samarati, P.1
-
31
-
-
0027699087
-
Lattice-based access control models
-
Nov.
-
R. Sandhu, "Lattice-Based Access Control Models," Computer Journal, Vol. 26, Nov. 1993.
-
(1993)
Computer Journal
, vol.26
-
-
Sandhu, R.1
-
32
-
-
0028513932
-
Access control: Principles and practice
-
Sept.
-
R. Sandu and P. Samarati, "Access Control: Principles and Practice." IEEE Communications Magazine, Vol. 32, No.9, Sept. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
-
-
Sandu, R.1
Samarati, P.2
-
33
-
-
0242613526
-
Role-based access control
-
M. Zerkowitz (ed.), Academic Press
-
R. Sandu, "Role-Based Access Control", Advances in Computer Science, Vol. 48, M. Zerkowitz (ed.), Academic Press, 1998.
-
(1998)
Advances in Computer Science
, vol.48
-
-
Sandu, R.1
-
34
-
-
84977755884
-
The ARBAC99 model for administrative roles
-
R. Sandu and Q. Munawer, "The ARBAC99 Model for Administrative Roles," Proc. of 15th Annual Computer Security Applications Conf., Phoenix, AZ, Dec. 1999.
-
Proc. of 15th Annual Computer Security Applications Conf., Phoenix, AZ, Dec. 1999
-
-
Sandu, R.1
Munawer, Q.2
-
36
-
-
4243553034
-
Information sharing for dynamic coalitions
-
VPSR Report 2836, Verdian Pacific-Sierra Research, Dec.
-
S. Spring and D. Gormley, "Information Sharing for Dynamic Coalitions," VPSR Report 2836, Verdian Pacific-Sierra Research, Dec. 2000.
-
(2000)
-
-
Spring, S.1
Gormley, D.2
-
38
-
-
0242445282
-
C4I for coalition warfare, command and control systems interoperability program
-
Quotation from the National Military Strategy; Army Digitization Office
-
Quotation from the National Military Strategy, "C4I For Coalition Warfare, Command and Control Systems Interoperability Program," Army Digitization Office, 1999.
-
(1999)
-
-
-
39
-
-
0242528829
-
A user-role based data security approach
-
Landwehr (ed.), North-Holland
-
T.C. Ting, "A User-Role Based Data Security Approach," Database Security: Status and Prospects, Landwehr (ed.), North-Holland, 1988.
-
(1988)
Database Security: Status and Prospects
-
-
Ting, T.C.1
-
40
-
-
0242613528
-
Application information security semantics: A case of mental health delivery
-
D. Spooner and C. Landwehr (eds.), North-Holland
-
T.C. Ting, "Application Information Security Semantics: A Case of Mental Health Delivery," Database Security, III: Status and Prospects, D. Spooner and C. Landwehr (eds.), North-Holland, 1990.
-
(1990)
Database Security, III: Status and Prospects
-
-
Ting, T.C.1
|