메뉴 건너뛰기




Volumn 15, Issue 10, 2004, Pages 1547-1557

Improved dynamically modified confidentiality policies model

Author keywords

Confidentiality policy; Formal model; IPC objects; Multiple level entity; Sensitivity level range

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; CONSTRAINT THEORY; FORMAL LOGIC; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 10644289533     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (21)
  • 1
    • 10644241308 scopus 로고    scopus 로고
    • Regel-basierte zugriffskontrolle nach dem generalized framework for access controlansatz am beispiel Linux
    • Diplomarbeit Universitat Hamburg
    • Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
    • (1997)
    • Ott, A.1
  • 2
    • 10644278428 scopus 로고    scopus 로고
    • Research on and enforcement of methods of secure operating systems development
    • [Ph.D. thesis, Beijing: Institute of Software, The Chinese Academy of Sciences, Chinese source
    • Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
    • (2001)
    • Shi, W.C.1
  • 5
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • Mitre Report, MTR-2997 Rev. 1
    • Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1, 1976.
    • (1976)
    • Bell, D.E.1    La Padula, L.J.2
  • 7
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce commercial security
    • IEEE Computer Society Press
    • Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.
    • (1988) Proc. of the IEEE Symp. on Security and Privacy , pp. 140-146
    • Lee, T.M.P.1
  • 9
    • 85041481084 scopus 로고
    • Design and verification of secure systems
    • Rushbyc J. Design and verification of secure systems. ACM Operating System Review, 1981, 15(5): 12-21.
    • (1981) ACM Operating System Review , vol.15 , Issue.5 , pp. 12-21
    • Rushbyc, J.1
  • 10
    • 0023827988 scopus 로고
    • Security policy modeling for the next-generation packet switch
    • IEEE Computer Society Press
    • Bell DE. Security policy modeling for the next-generation packet switch. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 212-216.
    • (1988) Proc. of the IEEE Symp. on Security and Privacy , pp. 212-216
    • Bell, D.E.1
  • 11
    • 0011272226 scopus 로고    scopus 로고
    • A new mandatory security policy combining secrecy and integrity
    • IBM Research Report, RC21717
    • Kargar PA, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM Research Report, RC21717, 2000.
    • (2000)
    • Kargar, P.A.1    Austel, V.2    Toll, D.3
  • 12
    • 1542488743 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • Technical Report, NAI Labs
    • Loscocco PA, Smalley SD. Integrating flexible support for security policies into the Linux operating system. Technical Report, NAI Labs, 2001.
    • (2001)
    • Loscocco, P.A.1    Smalley, S.D.2
  • 14
    • 0005936740 scopus 로고    scopus 로고
    • Assurance in the Fluke microkernel: Formal top-level specification
    • Secure Computing Corporation, CDRL A004. Technical Report, Secure Computing Corporation
    • Secure Computing Corporation. Assurance in the Fluke microkernel: Formal top-level specification. CDRL A004. Technical Report, Secure Computing Corporation, 1999.
    • (1999)
  • 15
    • 10644280789 scopus 로고    scopus 로고
    • Managing security on DG/UX system, manual 093-701138-04
    • Data General, Westboro: Data General Corporation, MA01580
    • Data General. Managing security on DG/UX system, manual 093-701138-04. Westboro: Data General Corporation, MA01580, 1996.
    • (1996)
  • 16
    • 10644287340 scopus 로고    scopus 로고
    • Trusted mach mathematical model
    • Technical Report, TIS tmach EDOC-0017-96B, Trusted Information System, Inc
    • Trusted Information System, Inc,. Trusted mach mathematical model. Technical Report, TIS tmach EDOC-0017-96B, Trusted Information System, Inc, 1996.
    • (1996)
  • 18
    • 0024121720 scopus 로고
    • A mandatory access control mechanism for the UNIX file system
    • IEEE Computer Society Press
    • Thomas T. A mandatory access control mechanism for the UNIX file system. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 173-177.
    • (1988) Proc. of the 4th Aerospace Computer Security Applications Conf. , pp. 173-177
    • Thomas, T.1
  • 19
    • 0347215214 scopus 로고    scopus 로고
    • UNIX network programming
    • Prentice-Hall, Inc.
    • Stevens WR. UNIX Network Programming. Volume 2: Interprocess Communications. Prentice-Hall, Inc., 1999.
    • (1999) Interprocess Communications , vol.2
    • Stevens, W.R.1
  • 20
    • 84865899713 scopus 로고    scopus 로고
    • MISSI B-level windows NT feasibility study
    • Final Report, MISSI, MISSI Contract MDA904-95-C-4088
    • Sutton S, Hinrichs S, Inskeep T. MISSI B-level windows NT feasibility study. Final Report, MISSI, MISSI Contract MDA904-95-C-4088, 1996.
    • (1996)
    • Sutton, S.1    Hinrichs, S.2    Inskeep, T.3
  • 21
    • 0024664251 scopus 로고
    • The incorporation of multi-level IPC into UNIX
    • IEEE Computer Society Press
    • Parenty TJ. The incorporation of multi-level IPC into UNIX. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1989. 94-99.
    • (1989) Proc. of the IEEE Symp. on Security and Privacy , pp. 94-99
    • Parenty, T.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.