-
1
-
-
8744240653
-
-
National Commission on Terrorist Attacks Upon the United States. The 9/ 11 Commission Report, 2004.
-
(2004)
The 9/11 Commission Report
-
-
-
2
-
-
0004200684
-
Computer security technology planning study
-
US Air Force Electronic Systems Div., Hanscom AFB
-
Anderson, J.P., Computer Security Technology Planning Study, Tech Report ESD-TR-73-51, US Air Force Electronic Systems Div., Hanscom AFB, 1972.
-
(1972)
Tech Report
, vol.ESD-TR-73-51
-
-
Anderson, J.P.1
-
4
-
-
0016555241
-
The protection of information in computer systems
-
September 1975
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63, 9 (September 1975), 1278-1308.
-
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
6
-
-
0003400251
-
-
Report ESD-TR-75-306, The MITRE Corporation, Bedford, Massachusetts, March
-
D. Bell and La Padula. Secure computer systems: unified exposition and MULTICS. Report ESD-TR-75-306, The MITRE Corporation, Bedford, Massachusetts, March 1976.
-
(1976)
Secure Computer Systems: Unified Exposition and MULTICS
-
-
Bell, D.1
Padula, L.2
-
8
-
-
0002422823
-
A role based access control model and reference implementation within a corporate intranet
-
February
-
D.F. Ferraiolo, J. Barkley, D.R. Kuhn, A Role Based Access Control Model and Reference Implementation within a Corporate Intranet, ACM Transactions on Information Systems Security, 1, 2 (February 1999), 34-64.
-
(1999)
ACM Transactions on Information Systems Security
, vol.1
, Issue.2
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.2
Kuhn, D.R.3
-
9
-
-
0003400255
-
-
Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, (April)
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, (April 1977).
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
10
-
-
0038967795
-
Role-based access control and the access control matrix
-
G. Saunders. Role-Based Access Control and the Access Control Matrix. ACM SIGOPS Operating System and Review, 35, 4 (2001), 6-20.
-
(2001)
ACM SIGOPS Operating System and Review
, vol.35
, Issue.4
, pp. 6-20
-
-
Saunders, G.1
-
11
-
-
0030419725
-
A domain and type enforcement prototype
-
L. Badger, et al. A Domain and Type Enforcement Prototype. Computing Systems, 9, 1 (1996), 47-83.
-
(1996)
Computing Systems
, vol.9
, Issue.1
, pp. 47-83
-
-
Badger, L.1
-
12
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models, IEEE Computer, 29, 2 (Feb. 1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
May
-
S. Osborn, R. Sandhu, and Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security, 3, 2 (May 2002), 85-106.
-
(2002)
ACM Transactions on Information and Systems Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
14
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
S. Jajodia, S. Pierangela, M. L. Sapino, V. S. Sabrahmanian. Flexible Support for Multiple Access Control Policies, ACM Transactions on Database Systems, 26, 2 (June 2001), 214-260.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Pierangela, S.2
Sapino, M.L.3
Sabrahmanian, V.S.4
|