-
1
-
-
10644241308
-
Regel-basierte zugriffskontrolle nach dem generalized framework for access controlansatz am beispiel Linux
-
Diplomarbeit Universitat Hamburg
-
Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
-
(1997)
-
-
Ott, A.1
-
2
-
-
10644278428
-
Research on and enforcement of methods of secure operating systems development
-
[Ph.D. thesis, Beijing: Institute of Software, The Chinese Academy of Sciences, Chinese source
-
Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
-
(2001)
-
-
Shi, W.C.1
-
4
-
-
0025442003
-
The sea view security model
-
Lunt T, Denning D, Schell R, Heckman M, Shockley W. The Sea View security model. IEEE Trans. on Software Engineering, 1990, 16(6): 593-607.
-
(1990)
IEEE Trans. on Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.1
Denning, D.2
Schell, R.3
Heckman, M.4
Shockley, W.5
-
5
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
Mitre Report, MTR-2997 Rev. 1
-
Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1, 1976.
-
(1976)
-
-
Bell, D.E.1
La Padula, L.J.2
-
7
-
-
0023859517
-
Using mandatory integrity to enforce commercial security
-
IEEE Computer Society Press
-
Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.
-
(1988)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 140-146
-
-
Lee, T.M.P.1
-
9
-
-
85041481084
-
Design and verification of secure systems
-
Rushbyc J. Design and verification of secure systems. ACM Operating System Review, 1981, 15(5): 12-21.
-
(1981)
ACM Operating System Review
, vol.15
, Issue.5
, pp. 12-21
-
-
Rushbyc, J.1
-
10
-
-
0023827988
-
Security policy modeling for the next-generation packet switch
-
IEEE Computer Society Press
-
Bell DE. Security policy modeling for the next-generation packet switch. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 212-216.
-
(1988)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 212-216
-
-
Bell, D.E.1
-
11
-
-
0011272226
-
A new mandatory security policy combining secrecy and integrity
-
IBM Research Report, RC21717
-
Kargar PA, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM Research Report, RC21717, 2000.
-
(2000)
-
-
Kargar, P.A.1
Austel, V.2
Toll, D.3
-
12
-
-
1542488743
-
Integrating flexible support for security policies into the Linux operating system
-
Technical Report, NAI Labs
-
Loscocco PA, Smalley SD. Integrating flexible support for security policies into the Linux operating system. Technical Report, NAI Labs, 2001.
-
(2001)
-
-
Loscocco, P.A.1
Smalley, S.D.2
-
14
-
-
0005936740
-
Assurance in the Fluke microkernel: Formal top-level specification
-
Secure Computing Corporation, CDRL A004. Technical Report, Secure Computing Corporation
-
Secure Computing Corporation. Assurance in the Fluke microkernel: Formal top-level specification. CDRL A004. Technical Report, Secure Computing Corporation, 1999.
-
(1999)
-
-
-
15
-
-
10644280789
-
Managing security on DG/UX system, manual 093-701138-04
-
Data General, Westboro: Data General Corporation, MA01580
-
Data General. Managing security on DG/UX system, manual 093-701138-04. Westboro: Data General Corporation, MA01580, 1996.
-
(1996)
-
-
-
16
-
-
10644287340
-
Trusted mach mathematical model
-
Technical Report, TIS tmach EDOC-0017-96B, Trusted Information System, Inc
-
Trusted Information System, Inc,. Trusted mach mathematical model. Technical Report, TIS tmach EDOC-0017-96B, Trusted Information System, Inc, 1996.
-
(1996)
-
-
-
17
-
-
84976780900
-
A security model for military message systems
-
Landwehr CE, Heitmeyer CL, McLean J. A security model for military message systems. ACM Trans. on Computer Systems, 1984, 9(3): 198-222.
-
(1984)
ACM Trans. on Computer Systems
, vol.9
, Issue.3
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
18
-
-
0024121720
-
A mandatory access control mechanism for the UNIX file system
-
IEEE Computer Society Press
-
Thomas T. A mandatory access control mechanism for the UNIX file system. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 173-177.
-
(1988)
Proc. of the 4th Aerospace Computer Security Applications Conf.
, pp. 173-177
-
-
Thomas, T.1
-
19
-
-
0347215214
-
UNIX network programming
-
Prentice-Hall, Inc.
-
Stevens WR. UNIX Network Programming. Volume 2: Interprocess Communications. Prentice-Hall, Inc., 1999.
-
(1999)
Interprocess Communications
, vol.2
-
-
Stevens, W.R.1
-
20
-
-
84865899713
-
MISSI B-level windows NT feasibility study
-
Final Report, MISSI, MISSI Contract MDA904-95-C-4088
-
Sutton S, Hinrichs S, Inskeep T. MISSI B-level windows NT feasibility study. Final Report, MISSI, MISSI Contract MDA904-95-C-4088, 1996.
-
(1996)
-
-
Sutton, S.1
Hinrichs, S.2
Inskeep, T.3
-
21
-
-
0024664251
-
The incorporation of multi-level IPC into UNIX
-
IEEE Computer Society Press
-
Parenty TJ. The incorporation of multi-level IPC into UNIX. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1989. 94-99.
-
(1989)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 94-99
-
-
Parenty, T.J.1
|