-
1
-
-
0024125793
-
Integrity controls for military and commercial applications
-
Florida: IEEE Computer Society Press
-
Jueneman R R. Integrity controls for military and commercial applications. In: Fourth Aerospace Computer Security Applications Conference. Florida: IEEE Computer Society Press, 1988. 298-322
-
(1988)
Fourth Aerospace Computer Security Applications Conference
, pp. 298-322
-
-
Jueneman, R.R.1
-
3
-
-
33749504401
-
Integrity-oriented control objectives: Proposed revision to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD)
-
prepared for National Security Agency (US)
-
Mayfleld T, Boore J M, Welke S R. Integrity-oriented control objectives: Proposed revision to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD), IDA document D-967, prepared for National Security Agency (US), available at http:/ www.mirrors.wiretapped.net/security/inf/reference/ncse- publications/C-TR-111-91.pdf
-
IDA Document
, vol.D-967
-
-
Mayfleld, T.1
Boore, J.M.2
Welke, S.R.3
-
7
-
-
0005314068
-
Integrity in automated information systems
-
National Computer Security Center
-
Mayfleld T, Roskos J E, Welke S R, et al. Integrity in automated information systems, NCSC Technical Report, National Computer Security Center, 1991, 91
-
(1991)
NCSC Technical Report
, pp. 91
-
-
Mayfleld, T.1
Roskos, J.E.2
Welke, S.R.3
-
8
-
-
0027928797
-
On five definitions of data integrity
-
Keefe T F, Landwehr C E, eds. Database Security, VII: Status and Prospects. Lake Guntersville, Alabama
-
Sandhu R S. On five definitions of data integrity. In: Keefe T F, Landwehr C E, eds. Database Security, VII: Status and Prospects. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Guntersville, Alabama, 1993. 257-267
-
(1993)
Proceedings of the IFIP WG11.3 Workshop on Database Security
, pp. 257-267
-
-
Sandhu, R.S.1
-
9
-
-
33749485278
-
Rule-set modeling of a trusted computer system
-
Abrams M D, Jajodia S, Podell H J, eds. Los Alamitos: IEEE Computer Society Press
-
LaPadula L J. Rule-set modeling of a trusted computer system. In: Abrams M D, Jajodia S, Podell H J, eds. Information Security: An Integrated Collection of Essays. Los Alamitos: IEEE Computer Society Press, 1995. 187-226
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 187-226
-
-
LaPadula, L.J.1
-
10
-
-
0011272226
-
A new mandatory security policy combining secrecy and integrity
-
Kargar P A, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM research report RC21717, 2000
-
(2000)
IBM Research Report
, vol.RC21717
-
-
Kargar, P.A.1
Austel, V.2
Toll, D.3
-
11
-
-
33749481446
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Fraser T. LOMAC: Low Water-Mark Integrity Protection for COTS Environments. NAI Labs report 0775, 2000
-
(2000)
NAI Labs Report
, vol.775
-
-
Fraser, T.1
-
12
-
-
33645586000
-
The Rule Set Based Access Control (RSBAC) linux kernel security extension
-
Enschede, November
-
Ott A. The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension. In: 8th International Linux Kongress, Enschede, November 2001. Available at http://www.rsbac.org/doc/media/linux-kongress/linux-kongress.html.
-
(2001)
8th International Linux Kongress
-
-
Ott, A.1
-
14
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
Oakland, CA: IEEE Computer Society Press
-
Badger L, Sterne D F, Sherman D L, et al. Practical domain and type enforcement for UNIX. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1995. 66-77
-
(1995)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
-
15
-
-
85084161648
-
Confining root programs with domain and type enforcement (DTE)
-
San Jose, CA
-
Walker K M, Sterne D F, Badger M L, et al. Confining root programs with domain and type enforcement (DTE). In: Proceedings of 1996 Usenix Security Symposium, San Jose, CA, 1996. Available at http://www.usenix.org/publications/ library/proceedings/sec96/walker.html.
-
(1996)
Proceedings of 1996 Usenix Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
-
16
-
-
84957865065
-
An approach to dynamic domain and type enforcement
-
Proceedings of the 2nd Australasian Conference on Information Security and Privacy, July
-
Tidswell J E, Potter J M. An approach to dynamic domain and type enforcement, Lecture Notes in Computer Science, Volume 1270. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy, July 1997, 26-37
-
(1997)
Lecture Notes in Computer Science
, vol.1270
, pp. 26-37
-
-
Tidswell, J.E.1
Potter, J.M.2
-
17
-
-
33749470823
-
Secure computing: The secure Ada target approach
-
Turn R, ed. Boston/London: Artech House, INC
-
Boebert W E, Kain R Y, Young W D. Secure computing: The secure Ada target approach, Advance in Computer System Security. Volume 3. Turn R, ed. Boston/London: Artech House, INC, 1988
-
(1988)
Advance in Computer System Security
, vol.3
-
-
Boebert, W.E.1
Kain, R.Y.2
Young, W.D.3
-
18
-
-
33749494089
-
Computer viruses: Theory and experiments
-
Turn R, ed. Boston/London: Artech House, INC
-
Cohen F. Computer viruses: theory and experiments, Advance in Computer System Security, Volume 3, Turn R, ed. Boston/London: Artech House, INC, 1988
-
(1988)
Advance in Computer System Security
, vol.3
-
-
Cohen, F.1
-
20
-
-
1242282117
-
Role-based application design and enforcement
-
Jajodia S, Landwehr C E, eds. North-Holland
-
Thomsen D J. Role-based application design and enforcement. In: Jajodia S, Landwehr C E, eds. Database Security, IV: Status and Prospects, North-Holland, 1991. 151-168
-
(1991)
Database Security, IV: Status and Prospects
, pp. 151-168
-
-
Thomsen, D.J.1
-
23
-
-
0031703267
-
Ensuring continuity during dynamic security policy reconfiguration in DTE
-
Oakland, CA: IEEE Computer Society Press
-
Fraser T, Badger L. Ensuring continuity during dynamic security policy reconfiguration in DTE. In: Proceedings of 1998 IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1998. 15-26
-
(1998)
Proceedings of 1998 IEEE Symposium on Research in Security and Privacy
, pp. 15-26
-
-
Fraser, T.1
Badger, L.2
-
25
-
-
33749486488
-
-
Engineering Research Center for Information Security Technology, the technical documentation of the "structured protection class" secure operating system, Mar.
-
Ji Q G, Tang L Y, Sheng Q N, ERCIST OS V4.0 security policy formal model and its applicatons (in Chinese), Engineering Research Center for Information Security Technology, the technical documentation of the "structured protection class" secure operating system, Mar. 2003
-
(2003)
ERCIST OS V4.0 Security Policy Formal Model and Its Applicatons (in Chinese)
-
-
Ji, Q.G.1
Tang, L.Y.2
Sheng, Q.N.3
|