-
2
-
-
0031185890
-
Information flow control in object-oriented systems
-
July/August
-
Samarati P., Bertino E., Ciampichetti A., Jajodia S. Information flow control in object-oriented systems. IEEE Trans. Knowledge Data Engng. 9:(4):1997;524-538. July/August.
-
(1997)
IEEE Trans. Knowledge Data Engng
, vol.9
, Issue.4
, pp. 524-538
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
4
-
-
0346203703
-
Exception-based information flow control in object-oriented systems
-
Bertino E., de Capitani di Vimercati S., Ferrari E., Samarati P. Exception-based information flow control in object-oriented systems. ACM Trans. Inf. Syst. Security. 1:(1):1998;26-65.
-
(1998)
ACM Trans. Inf. Syst. Security
, vol.1
, Issue.1
, pp. 26-65
-
-
Bertino, E.1
De Capitani di Vimercati, S.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
0003853254
-
A purposed-oriented access control model in object-based systems
-
Tachikawa T., Yasuda M., Takizawa M. A purposed-oriented access control model in object-based systems. Trans. Inf. Process. Soc. Jpn. 38:(11):1997;2362-2369.
-
(1997)
Trans. Inf. Process. Soc. Jpn
, vol.38
, Issue.11
, pp. 2362-2369
-
-
Tachikawa, T.1
Yasuda, M.2
Takizawa, M.3
-
14
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Myers A., Liskov B. Protecting privacy using the decentralized label model. ACM Trans. Software Engng Methodol. 9:(4):2000;410-442.
-
(2000)
ACM Trans. Software Engng Methodol.
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.1
Liskov, B.2
-
16
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Mitre Corporation, March
-
D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Technique Report, Mitre Corporation, March 1976, http://csrc.nist.gov/publications/history/bell76.pdf .
-
(1976)
Technique Report
-
-
Bell, D.E.1
LaPadula, L.J.2
-
17
-
-
0016949746
-
A lattice model of secure information flow
-
Denning D.E. A lattice model of secure information flow. Commun. ACM. 19:(5):1976;236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
18
-
-
0017517624
-
Certification of program for secure information flow
-
Denning D.E., Denning P.J. Certification of program for secure information flow. Commun. ACM. 20:(7):1977;504-513.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
22
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
McIlroy M.D., Reeds J.A. Multilevel security in the UNIX tradition. Software - Practice Exp. 22:(8):1992;673-694.
-
(1992)
Software - Practice Exp.
, vol.22
, Issue.8
, pp. 673-694
-
-
Mcilroy, M.D.1
Reeds, J.A.2
-
26
-
-
1242320313
-
Embedding role-based access control model in object-oriented systems to protect privacy
-
to appear in the
-
S.-C. Chou, Embedding role-based access control model in object-oriented systems to protect privacy, to appear in the Journal of Systems and Software.
-
Journal of Systems and Software
-
-
Chou, S.-C.1
-
27
-
-
0031232270
-
A role-based access control for intranet security
-
Tari Z., Chan S.-W. A role-based access control for intranet security. IEEE Internet Comput. 1:(5):1997;24-34.
-
(1997)
IEEE Internet Comput
, vol.1
, Issue.5
, pp. 24-34
-
-
Tari, Z.1
Chan, S.-W.2
-
29
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Security. 4:(3):2001;224-274.
-
(2001)
ACM Trans. Inf. Syst. Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
34
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn S., Sandhu R., Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Security. 3:(2):2000;85-106.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
35
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. IEEE Comput. 29:(2):1996;38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
41
-
-
0003511049
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
Rumbaugh J., Blaha M., Premerlani W., Eddy F., Lorensen W. Object-Oriented Modeling and Design. 1991;Prentice-Hall, Englewood Cliffs, NJ.
-
(1991)
Object-oriented Modeling and Design
-
-
Rumbaugh, J.1
Blaha, M.2
Premerlani, W.3
Eddy, F.4
Lorensen, W.5
-
43
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi R., Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Software Engng. 23:(9):1997;550-571.
-
(1997)
IEEE Trans. Software Engng
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
|