-
1
-
-
19944423977
-
The protection of information in computer systems
-
July
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM 17(7), July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
2
-
-
84860965918
-
-
http://www.microsoft.com/office/editions/prodinfo/technologies/irm.mspx
-
-
-
-
3
-
-
84860971939
-
-
http://www.authentica.com/products/document_protection.asp
-
-
-
-
4
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E. E. Schultz. A Framework for Understanding and Predicting Insider Attacks. Computers and Security 21(6), pages 526-531, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
9
-
-
14844332191
-
More enforceable security policies
-
Copenhagen, Denmark, July
-
L. Bauer, J. Ligatti, and D. Walker. More enforceable security policies. In Proceedings of the Workshop on Foundations of Computer Security (FCS'02), Copenhagen, Denmark, July 2002.
-
(2002)
Proceedings of the Workshop on Foundations of Computer Security (FCS'02)
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
10
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The MITRE Corporation, May
-
D. E. Bell and L. J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, May 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.E.1
La Padula, L.J.2
-
13
-
-
33749396186
-
The specification and enforcement of advanced security policies
-
T. Ryutov and C. Neuman. The Specification and Enforcement of Advanced Security Policies. Policy 2002.
-
Policy 2002
-
-
Ryutov, T.1
Neuman, C.2
-
14
-
-
3543132789
-
Extensible Access Control Markup Language (XACML) Version 1.0
-
February
-
S. Godik, T. Moses, et al. extensible Access Control Markup Language (XACML) Version 1.0. OASIS standard, February, 2003.
-
(2003)
OASIS Standard
-
-
Godik, S.1
Moses, T.2
-
16
-
-
0011795795
-
Provisional authorizations
-
Gosh, A., editor, Kluwer Academic Press, Boston
-
S. Jajodia, M. Kudo and V. S. Subramanian. Provisional Authorizations, In Gosh, A., editor, E-Commerce Security and Privacy, pages 133-159, 2001, Kluwer Academic Press, Boston.
-
(2001)
E-commerce Security and Privacy
, pp. 133-159
-
-
Jajodia, S.1
Kudo, M.2
Subramanian, V.S.3
-
18
-
-
84944792110
-
TRBAC: A temporal role-based access control
-
August
-
E. Bertino, P. A. Bonatti and E. Ferrari. TRBAC: A temporal role-based access control. ACM Transactions on Information and System Security, 4(3), pages 191-223, August, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
19
-
-
0016984825
-
Protection in operating systems
-
M. Harrison, W. Ruzzo and J. Ullman. Protection in operating systems. CACM, pages 461-471,19(8), 1976.
-
(1976)
CACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
22
-
-
0028678369
-
Theft of information in the take-grant protection model
-
M. Bishop. Theft of information in the take-grant protection model. Journal of Computer Security, 3(4), pages 283-309, 1994/1995.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.4
, pp. 283-309
-
-
Bishop, M.1
|