메뉴 건너뛰기




Volumn , Issue , 2004, Pages 38-45

Overview of a high assurance architecture for distributed multilevel security

Author keywords

[No Author keywords available]

Indexed keywords

INTEGRATED SECURITY STRUCTURE; NETWORK SECURITY; SECURITY POLICIES; SECURITY SERVICES;

EID: 20144389120     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (47)
  • 2
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • MITRE Corp., Hanscom AFB, MA
    • D. E. Bell and L. LaPadula, "Secure Computer System: Unified Exposition and Multics Interpretation," Tech. Rep. ESD-TR-75-306, MITRE Corp., Hanscom AFB, MA, 1975.
    • (1975) Tech. Rep. , vol.ESD-TR-75-306
    • Bell, D.E.1    LaPadula, L.2
  • 3
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corp.
    • K. J. Biba, "Integrity Considerations for Secure Computer Systems," Tech. Rep. ESD-TR-76-372, MITRE Corp., 1977.
    • (1977) Tech. Rep. , vol.ESD-TR-76-372
    • Biba, K.J.1
  • 6
    • 15944378656 scopus 로고
    • CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May
    • National Computer Security Center, Final Evaluation Report of HFSI XTS-200, CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May 1992.
    • (1992) Final Evaluation Report of HFSI XTS-200
  • 15
    • 15944410399 scopus 로고    scopus 로고
    • An Approach to security requirements engineering for a high assurance system
    • C. E. Irvine, T. Levin, J. D. Wilson, D. Shifflett, and B. Pereira, "An Approach to Security Requirements Engineering for a High Assurance System," Requirements Engineering, vol. 7, no. 4, pp. 192-208, 2002.
    • (2002) Requirements Engineering , vol.7 , Issue.4 , pp. 192-208
    • Irvine, C.E.1    Levin, T.2    Wilson, J.D.3    Shifflett, D.4    Pereira, B.5
  • 18
    • 15944410050 scopus 로고    scopus 로고
    • Master's thesis, Naval Postgraduate School, Monterey, CA, September
    • E. Brown, "SMTP on a High Assurance Multilevel Server," Master's thesis, Naval Postgraduate School, Monterey, CA, September 2000.
    • (2000) SMTP on a High Assurance Multilevel Server
    • Brown, E.1
  • 26
    • 0020779556 scopus 로고
    • A distributed secure system
    • May
    • J. Rushby and B. Randell, "A Distributed Secure System," in Computer, pp. 55-67, May 1983.
    • (1983) Computer , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 27
    • 0024874249 scopus 로고
    • Multiple operating systems on one processor complex
    • T. Borden, J. Hennessy, and J. Rymarczyk, "Multiple Operating Systems On One Processor Complex," IBM Systems Journal, vol. 28, no. 1, pp. 104-123, 1989.
    • (1989) IBM Systems Journal , vol.28 , Issue.1 , pp. 104-123
    • Borden, T.1    Hennessy, J.2    Rymarczyk, J.3
  • 29
    • 15944406548 scopus 로고    scopus 로고
    • Analysis of terminal server architectures for thin clients in a high assurance network
    • (Baltimore, MD), October
    • S. R. Balmer and C. E. Irvine, "Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network," in Proceedings of the National Information Systems Security Conference, (Baltimore, MD), pp. 192-202, October 2000.
    • (2000) Proceedings of the National Information Systems Security Conference , pp. 192-202
    • Balmer, S.R.1    Irvine, C.E.2
  • 31
    • 85084161596 scopus 로고    scopus 로고
    • Analyzing the intel pentium's capability to support a secure virtual machine monitor
    • (Denver, CO), August
    • J. S. Robin and C. E. Irvine, "Analyzing the Intel Pentium's Capability to Support a Secure Virtual Machine Monitor," in Proceedings of the 9th USENIX Security Symposium, (Denver, CO), August 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium
    • Robin, J.S.1    Irvine, C.E.2
  • 32
  • 37
    • 0032047528 scopus 로고    scopus 로고
    • Design and assurance strategy for the NRL pump
    • April
    • M. H. Kang and I. Moskowitz, "Design and Assurance Strategy for the NRL Pump," IEEE Computer, vol. 31, pp. 56-64, April 1998.
    • (1998) IEEE Computer , vol.31 , pp. 56-64
    • Kang, M.H.1    Moskowitz, I.2
  • 40
    • 33645586000 scopus 로고    scopus 로고
    • The Rule Sett Based Access Control (RSBAC) linux kernel security extension
    • (Enschede, Netherlands), Linux-Kongress, November
    • A. Ott, "The Rule Sett Based Access Control (RSBAC) Linux Kernel Security Extension," in 8th International Linux Kongress, (Enschede, Netherlands), Linux-Kongress, November 2001.
    • (2001) 8th International Linux Kongress
    • Ott, A.1
  • 41
    • 84860100096 scopus 로고    scopus 로고
    • October
    • P. Loscocco and S. Smalley. http://www.nsa.gov/selinux/slinuxabs.html, October 2000.
    • (2000)
    • Loscocco, P.1    Smalley, S.2
  • 42
    • 3242738876 scopus 로고    scopus 로고
    • A security policy configuration for security-enhanced linux
    • NAI Labs, January
    • S. Smalley and T. Fraser, "A Security Policy Configuration for Security-Enhanced Linux," tech. rep., NAI Labs, January 2001.
    • (2001) Tech. Rep.
    • Smalley, S.1    Fraser, T.2
  • 43
    • 15944393278 scopus 로고    scopus 로고
    • Information support to multinational operations
    • July
    • C. Sanders, "Information Support to Multinational Operations," The Edge, vol. 5, July 2001.
    • (2001) The Edge , vol.5
    • Sanders, C.1
  • 44
    • 15944421531 scopus 로고    scopus 로고
    • Windows 2000 evaluated configuration administrator's guide, version 1.0
    • Microsoft Corporation, Redmond, WA
    • Microsoft, "Windows 2000 Evaluated Configuration Administrator's Guide, Version 1.0," tech. rep., Microsoft Corporation, Redmond, WA, 2002.
    • (2002) Tech. Rep.
  • 47
    • 65449124474 scopus 로고    scopus 로고
    • October
    • R. Sharpe, "Just What is SMB?," http://samba.anu.edu.au/cifs/ docs/what-is-smb.html, October 2002.
    • (2002) Just What Is SMB?
    • Sharpe, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.