-
1
-
-
77954788286
-
Improving the security of your UNIX system
-
SRI International, April
-
Curry, D. A., Improving the security of your UNIX system, Technology report ITSTD-721-FR-90-21, SRI International, April 1990.
-
(1990)
Technology Report
, vol.ITSTD-721-FR-90-21
-
-
Curry, D.A.1
-
2
-
-
33746338386
-
Addressing secrity issues in Linux
-
IBM server group. Addressing secrity issues in Linux, A Linux White Paper, 2000.
-
(2000)
A Linux White Paper
-
-
-
3
-
-
10644280789
-
-
Data General Corporation, Westboro, MA01580, Nov.
-
Data General, Managing security on DG/UX system, manual 093-701138-04, Data General Corporation, Westboro, MA01580, Nov. 1996.
-
(1996)
Managing Security on DG/UX System, Manual 093-701138-04
-
-
-
4
-
-
1542697134
-
SubDomain: Parsimonious server security
-
New Orleans, LA, December
-
Cowan, C., Beattie, S., Kroach-Hartman, G. et al., SubDomain: parsimonious server security, 14th USENIX Systems Administration Conference (LISA 2000), New Orleans, LA, December 2000.
-
(2000)
14th USENIX Systems Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Kroach-Hartman, G.3
-
5
-
-
84949201378
-
A framework for multiple authorization types in a healthcare application system
-
December
-
Chandramouli, R., A framework for multiple authorization types in a healthcare application system, in Proc. 17th Annual Computer Security Applications Conference, December 2001,137-148.
-
(2001)
Proc. 17th Annual Computer Security Applications Conference
, pp. 137-148
-
-
Chandramouli, R.1
-
7
-
-
0030086382
-
Role based access control models
-
February
-
Sandhu, R.S., Coyne, E. J., Feinstein, H. L. et al., Role based access control models, IEEE Computer, February 1996, 29(2): 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
-
8
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
Ferraiolo, D. F., Sandhu, R., Gavrila, S. et al., Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, August 2001, 4(3): 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
-
9
-
-
0012367317
-
An operating system approach to securing e-services
-
Dalton, C., Choo, T. H., An operating system approach to securing e-services, Communication of the ACM, 2001, 44(2): 58-66.
-
(2001)
Communication of the ACM
, vol.44
, Issue.2
, pp. 58-66
-
-
Dalton, C.1
Choo, T.H.2
-
10
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large database
-
Baldwin, R. W., Naming and grouping privileges to simplify security management in large database, in Proceedings of IEEE Symposium on Security and Privacy, 1990, 116-132.
-
(1990)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 116-132
-
-
Baldwin, R.W.1
-
11
-
-
85084163300
-
Scalable access control for distributed object systems
-
Washington,D.D., USA, August
-
Steme, D. F., Tally, G. W., McDonell, C. D. et al., Scalable access control for distributed object systems, in Proceedings of the 8th USENIX Security Symposium, Washington,D.D., USA, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Steme, D.F.1
Tally, G.W.2
McDonell, C.D.3
-
15
-
-
0031346670
-
Mutual exclusion as a means of implementing separation of duty requirements in role-based access control systems
-
New York: ACM Press
-
Kuhn, D. R., Mutual exclusion as a means of implementing separation of duty requirements in role-based access control systems, in Proceedings of the 2nd ACM Workshop on Role-Based Access Control, New York: ACM Press, 1997, 23-30.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-based Access Control
, pp. 23-30
-
-
Kuhn, D.R.1
-
17
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
New York: ACM Press
-
Gavrila, S. I., Barkley, J. F., Formal specification for role based access control user/role and role/role relationship management, in Proceedings of the 3nd ACM Workshop on Role-Based Access Control, New York: ACM Press, 1998, 81-90.
-
(1998)
Proceedings of the 3nd ACM Workshop on Role-based Access Control
, pp. 81-90
-
-
Gavrila, S.I.1
Barkley, J.F.2
-
18
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
February
-
Ferraiolo, D. F., Barkley, J. F., Kuhn, D. R., A role-based access control model and reference implementation within a corporate intranet, ACM Transactions on Infoemation and System Security, February 1999, 2(1): 34-64.
-
(1999)
ACM Transactions on Infoemation and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
19
-
-
0023266943
-
A comparison of commercial and military security policies
-
IEEE Computer Society Press, April
-
Clark, D. D., Wilson, D. R., A comparison of commercial and military security policies, in Proceedings of 1987 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, April 1987, 184-238.
-
(1987)
Proceedings of 1987 IEEE Symposium on Research in Security and Privacy
, pp. 184-238
-
-
Clark, D.D.1
Wilson, D.R.2
-
20
-
-
0002262722
-
Role-based control(RBAC): Features and motivations
-
December
-
Ferraiolo, D. F., Cugini, J. A., Kuhn, D. R., Role-based control(RBAC): features and motivations, in Proceedings 11th Annual Computer Security Applications Conference, December 1995, 241-248.
-
(1995)
Proceedings 11th Annual Computer Security Applications Conference
, pp. 241-248
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.R.3
-
21
-
-
33748161983
-
Configuring the SELinux policy
-
NAI Labs, June
-
Smalley, S. D., Configuring the SELinux policy, Technical report#02-007, NAI Labs, June 2002.
-
(2002)
Technical Report#02-007
, vol.2
, Issue.7
-
-
Smalley, S.D.1
-
23
-
-
33746363362
-
Modeling database security requirements
-
(ed. Landwehr, C. E.), Amsterdam: North-Holland
-
Haigh, J.T., Modeling database security requirements, in Database Security: Status and Prospects (ed. Landwehr, C. E.), Amsterdam: North-Holland, 1988, 45-56.
-
(1988)
Database Security: Status and Prospects
, pp. 45-56
-
-
Haigh, J.T.1
-
24
-
-
1242282117
-
Role-based application design and enforcement
-
(eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland
-
Thomsen, D. J., Role-based application design and enforcement, in Database Security, IV: Status and Prospects (eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland 1991, 151-168.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 151-168
-
-
Thomsen, D.J.1
-
25
-
-
2442425355
-
Integrating flexiable support for security policies into the Linux operating system
-
NAI Labs, April
-
Loscocco, P. A., Smalley, S. D., Integrating flexiable support for security policies into the Linux operating system, Technical report, NAI Labs, April 2001.
-
(2001)
Technical Report
-
-
Loscocco, P.A.1
Smalley, S.D.2
|