메뉴 건너뛰기




Volumn 144, Issue , 2004, Pages 357-370

Configuring storage-area networks for mandatory security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; DIGITAL STORAGE;

EID: 26444581576     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8128-6_24     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 3
    • 2442501617 scopus 로고    scopus 로고
    • Modelling and detecting the cascade vulnerability problem using soft constraints
    • Nicosia, Cyprus, March, ACM Press
    • Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Modelling and detecting the cascade vulnerability problem using soft constraints. In Proceedings of the ACM Symposium on Applied Computing, Nicosia, Cyprus, March 2004. ACM Press.
    • (2004) Proceedings of the ACM Symposium On Applied Computing
    • Bistarelli, S.1    Foley, S.N.2    O'Sullivan, B.3
  • 8
    • 84974747910 scopus 로고
    • Aggregation and separation as noninterference properties
    • Simon N. Foley. Aggregation and separation as noninterference properties. Journal of Computer Security, 1(2):159-188, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.2 , pp. 159-188
    • Foley, S.N.1
  • 9
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of commercial security requirements including dynamic segregation of duties
    • Zurich, Switzerland, April, ACM Press
    • Simon N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In Proceedings of the 4 ACM Conference on Computer and Communications Security, pages 125-134, Zurich, Switzerland, April 1997. ACM Press.
    • (1997) Proceedings of the 4 ACM Conference On Computer and Communications Security , pp. 125-134
    • Foley, S.N.1
  • 10
    • 84958062112 scopus 로고
    • Eliminating interchangeable values in constraint satisfaction problems
    • California, USA, July, MIT Press
    • Eugene Freuder. Eliminating interchangeable values in constraint satisfaction problems. In Proceedings of the 9' National Conference on Artificial Intelligence, volume 1, pages 227-233, California, USA, July 1991. MIT Press.
    • (1991) Proceedings of the 9' National Conference On Artificial Intelligence , vol.1 , pp. 227-233
  • 11
    • 0004967366 scopus 로고    scopus 로고
    • Strategic directions in storage i/o issues in large-scale computing
    • Garth A. Gibson, Jeffrey Scott Vitter, and John Wilkes. Strategic directions in storage i/o issues in large-scale computing. ACM Computing Surveys, 28(4):779-793, 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.4 , pp. 779-793
    • Gibson, G.A.1    Vitter, J.S.2    Wilkes, J.3
  • 17
    • 0025135715 scopus 로고
    • Extending the brewer-nash model to a multilevel context
    • Oakland, California, USA, May, IEEE Computer Society Press
    • Catherine Meadows. Extending the brewer-nash model to a multilevel context. In Proceedings of the IEEE Symposium on Security and Privacy, pages 95-102, Oakland, California, USA, May 1990. IEEE Computer Society Press.
    • (1990) Proceedings of the IEEE Symposium On Security and Privacy , pp. 95-102
    • Meadows, C.1
  • 21
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • Ravi S. Sandhu. Lattice-based access control models. Computer, 26(11):9-19, November 1993.
    • (1993) Computer , vol.26 , Issue.11 , pp. 9-19
    • Ravi, S.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.