-
1
-
-
0842327102
-
A philosophy of security management
-
ed. M.D. Abrams, S. Jajodia, and H.J. Podell, IEEE Computer Society Press
-
D. Bailey, "A philosophy of security management," in Information Security: An Integrated Collection of Essays, ed. M.D. Abrams, S. Jajodia, and H.J. Podell, pp.98-110, IEEE Computer Society Press, 1995.
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 98-110
-
-
Bailey, D.1
-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE Corp., Bedford, MA, March
-
D.E. Bell and L.J. LaPadula, "Secure computer systems: Mathematical foundations and model," Technical Report ESD-TR-73-278-I, MITRE Corp., Bedford, MA, March 1973.
-
(1973)
Technical Report
, vol.ESD-TR-73-278-I
-
-
Bell, D.E.1
Lapadula, L.J.2
-
4
-
-
0029706405
-
A security model of dynamic labeling providing a tiered approach to verification
-
S.N. Foley, L. Gong, and X. Qian, "A security model of dynamic labeling providing a tiered approach to verification," Proc. IEEE Symposium on Security and Privacy, pp.142-153, 1996.
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 142-153
-
-
Foley, S.N.1
Gong, L.2
Qian, X.3
-
7
-
-
0009442659
-
Monotonic protection systems
-
ed. R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, Academic Press
-
M.A. Harrison and W.L. Ruzzo, "Monotonic protection systems," in Foundations of Secure Computations, ed. R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, pp.337-365, Academic Press, 1978.
-
(1978)
Foundations of Secure Computations
, pp. 337-365
-
-
Harrison, M.A.1
Ruzzo, W.L.2
-
8
-
-
0016984825
-
Protection in operating systems
-
Aug.
-
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in operating systems," Commun. ACM, vol.19, no.8, pp.461-471, Aug. 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
84882574666
-
A linear time algorithm for deciding security
-
Houston, TX, Oct.
-
A.K. Jones, R.J. Lipton, and L. Snyder, "A linear time algorithm for deciding security," 17th Annual Symposium on Foundations of Computer Science, pp.33-41, Houston, TX, Oct. 1976.
-
(1976)
17th Annual Symposium on Foundations of Computer Science
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
12
-
-
0842305607
-
Protection (security) models and policy
-
ed. A.B. Tucker, Jr., chapter 90, CRC Press, Boca Raton, FL
-
C.E. Landwehr, "Protection (security) models and policy," in The Computer Science and Engineering Handbook, ed. A.B. Tucker, Jr., chapter 90, pp. 1914-1928, CRC Press, Boca Raton, FL, 1997.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1914-1928
-
-
Landwehr, C.E.1
-
14
-
-
0003307796
-
Security models
-
ed. J.J. Marciniak, John Wiley & Sons
-
J. MCLean, "Security models," in Encyclopedia of Software Engineering, ed. J.J. Marciniak, vol.2, pp.1136-1145, John Wiley & Sons, 1994.
-
(1994)
Encyclopedia of Software Engineering
, vol.2
, pp. 1136-1145
-
-
McLean, J.1
-
15
-
-
0037556344
-
Policies for dynamic upgrading
-
ed. S. Jajodia and C.E. Landwehr, Elsevier Science Publishers B. V. (North-Holland)
-
C. Meadows, "Policies for dynamic upgrading," in Database Security, IV: Status and Prospects, ed. S. Jajodia and C.E. Landwehr, pp.241-250, Elsevier Science Publishers B. V. (North-Holland), 1991.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 241-250
-
-
Meadows, C.1
-
16
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating schemes
-
April
-
R.S. Sandhu, "The schematic protection model: Its definition and analysis for acyclic attenuating schemes," J. ACM, vol.35, no.2, pp.404-432, April 1988.
-
(1988)
J. ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
17
-
-
84974744165
-
Expressive power of the schematic protection model
-
R.S. Sandhu, "Expressive power of the schematic protection model," J. Comput. Security, vol.1, no.1, pp.59-98, 1992.
-
(1992)
J. Comput. Security
, vol.1
, Issue.1
, pp. 59-98
-
-
Sandhu, R.S.1
-
19
-
-
0026819359
-
Undecidability of the safety problem for the schematic protection model with cyclic creates
-
Feb.
-
R.S. Sandhu, "Undecidability of the safety problem for the schematic protection model with cyclic creates," J. Comput. Syst. Sci., vol.44, no.1, pp.141-159. Feb. 1992.
-
(1992)
J. Comput. Syst. Sci.
, vol.44
, Issue.1
, pp. 141-159
-
-
Sandhu, R.S.1
-
20
-
-
3142653660
-
Expressive power of the single-object typed access matrix model
-
Dec.
-
R.S. Sandhu and S. Ganta, "Expressive power of the single-object typed access matrix model," in Computer Security Applications Conference, pp.184-194, Dec. 1993.
-
(1993)
Computer Security Applications Conference
, pp. 184-194
-
-
Sandhu, R.S.1
Ganta, S.2
-
22
-
-
0019548112
-
Formal models of capability-based protection systems
-
March
-
L. Snyder, "Formal models of capability-based protection systems," IEEE Trans. Comput., vol.C-30, no.3, pp.172-181, March 1981.
-
(1981)
IEEE Trans. Comput.
, vol.C-30
, Issue.3
, pp. 172-181
-
-
Snyder, L.1
-
23
-
-
85027200095
-
-
PhD Thesis, Graduate School of Information Systems, University of Electro-Communications, March
-
M. Soshi, Design, Safety Analysis, and Applications of the Access Control Model based on Dual Labels, PhD Thesis, Graduate School of Information Systems, University of Electro-Communications, March 1999.
-
(1999)
Design, Safety Analysis, and Applications of the Access Control Model Based on Dual Labels
-
-
Soshi, M.1
-
24
-
-
84944079173
-
Safety analysis of the dynamic-typed access matrix model
-
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security ed. F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, Springer-Verlag, Oct.
-
M. Soshi, "Safety analysis of the dynamic-typed access matrix model," in Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, ed. F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, vol.1895 of Lecture Notes in Computer Science, pp. 106-121, Springer-Verlag, Oct. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 106-121
-
-
Soshi, M.1
-
25
-
-
0842305605
-
An access control model based on dual label
-
March
-
M. Soshi, T. Kato, and M. Maekawa, "An access control model based on dual labels," Trans. IPSJ, vol.40, no.3, pp.1305-1314, March 1999.
-
(1999)
Trans. IPSJ
, vol.40
, Issue.3
, pp. 1305-1314
-
-
Soshi, M.1
Kato, T.2
Maekawa, M.3
|