메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 566-569

Lattice model based on a new information security function

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING; MATHEMATICAL MODELS; PROBLEM SOLVING; VECTORS;

EID: 33744934219     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISADS.2005.1452137     Document Type: Conference Paper
Times cited : (2)

References (4)
  • 1
    • 33744933245 scopus 로고
    • Comupter system mathematical
    • MTR-2527, Mitre Corp., Bedford, MA (NITS AD-771543)
    • Bell DE, Lapadula and LJ. Secure, "Comupter System Mathematical" Report Foundation, MTR-2527, Mitre Corp., Bedford, MA, 1973 (NITS AD-771543).
    • (1973) Report Foundation
    • Bell, D.E.1    Lapadula2    Secure, L.J.3
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computing systems
    • Report, Mitre Corp., Bedford, MA
    • Biba, K, "Integrity Considerations for Secure Computing Systems" Report, Mitre Report MTR-3153, Mitre Corp., Bedford, MA, 1975.
    • (1975) Mitre Report , vol.MTR-3153
    • Biba, K.1
  • 3
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • ACM, May
    • D.E.Denning, "A Lattice model of Secure Information Flow", Journal, Commu., ACM, Vol. 19, No. 5, May 1976, pp. 236-243.
    • (1976) Journal, Commu. , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 4
    • 0027699087 scopus 로고
    • Lattic-based access control model
    • Nov
    • Ravi S.Sandhu, "Lattic-Based Access Control Model", Journal, IEEE Computer, vol 26, Number 11, Nov 1993, pp. 9-19.
    • (1993) Journal, IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.