메뉴 건너뛰기




Volumn 49, Issue 5, 2006, Pages 545-565

A formal model for integrity protection based on DTE technique

Author keywords

Domain; Formal model; Information flow; Integrity policy; Type

Indexed keywords


EID: 33749460449     PISSN: 10092757     EISSN: 18622836     Source Type: Journal    
DOI: 10.1007/s11432-006-2014-6     Document Type: Article
Times cited : (5)

References (27)
  • 1
    • 0024125793 scopus 로고
    • Integrity controls for military and commercial applications
    • Florida: IEEE Computer Society Press
    • Jueneman R R. Integrity controls for military and commercial applications. In: Fourth Aerospace Computer Security Applications Conference. Florida: IEEE Computer Society Press, 1988. 298-322
    • (1988) Fourth Aerospace Computer Security Applications Conference , pp. 298-322
    • Jueneman, R.R.1
  • 3
    • 33749504401 scopus 로고    scopus 로고
    • Integrity-oriented control objectives: Proposed revision to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD)
    • prepared for National Security Agency (US)
    • Mayfleld T, Boore J M, Welke S R. Integrity-oriented control objectives: Proposed revision to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD), IDA document D-967, prepared for National Security Agency (US), available at http:/ www.mirrors.wiretapped.net/security/inf/reference/ncse- publications/C-TR-111-91.pdf
    • IDA Document , vol.D-967
    • Mayfleld, T.1    Boore, J.M.2    Welke, S.R.3
  • 7
    • 0005314068 scopus 로고
    • Integrity in automated information systems
    • National Computer Security Center
    • Mayfleld T, Roskos J E, Welke S R, et al. Integrity in automated information systems, NCSC Technical Report, National Computer Security Center, 1991, 91
    • (1991) NCSC Technical Report , pp. 91
    • Mayfleld, T.1    Roskos, J.E.2    Welke, S.R.3
  • 8
    • 0027928797 scopus 로고
    • On five definitions of data integrity
    • Keefe T F, Landwehr C E, eds. Database Security, VII: Status and Prospects. Lake Guntersville, Alabama
    • Sandhu R S. On five definitions of data integrity. In: Keefe T F, Landwehr C E, eds. Database Security, VII: Status and Prospects. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Guntersville, Alabama, 1993. 257-267
    • (1993) Proceedings of the IFIP WG11.3 Workshop on Database Security , pp. 257-267
    • Sandhu, R.S.1
  • 9
    • 33749485278 scopus 로고
    • Rule-set modeling of a trusted computer system
    • Abrams M D, Jajodia S, Podell H J, eds. Los Alamitos: IEEE Computer Society Press
    • LaPadula L J. Rule-set modeling of a trusted computer system. In: Abrams M D, Jajodia S, Podell H J, eds. Information Security: An Integrated Collection of Essays. Los Alamitos: IEEE Computer Society Press, 1995. 187-226
    • (1995) Information Security: An Integrated Collection of Essays , pp. 187-226
    • LaPadula, L.J.1
  • 10
    • 0011272226 scopus 로고    scopus 로고
    • A new mandatory security policy combining secrecy and integrity
    • Kargar P A, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM research report RC21717, 2000
    • (2000) IBM Research Report , vol.RC21717
    • Kargar, P.A.1    Austel, V.2    Toll, D.3
  • 11
    • 33749481446 scopus 로고    scopus 로고
    • LOMAC: Low water-mark integrity protection for COTS environments
    • Fraser T. LOMAC: Low Water-Mark Integrity Protection for COTS Environments. NAI Labs report 0775, 2000
    • (2000) NAI Labs Report , vol.775
    • Fraser, T.1
  • 12
    • 33645586000 scopus 로고    scopus 로고
    • The Rule Set Based Access Control (RSBAC) linux kernel security extension
    • Enschede, November
    • Ott A. The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension. In: 8th International Linux Kongress, Enschede, November 2001. Available at http://www.rsbac.org/doc/media/linux-kongress/linux-kongress.html.
    • (2001) 8th International Linux Kongress
    • Ott, A.1
  • 15
    • 85084161648 scopus 로고    scopus 로고
    • Confining root programs with domain and type enforcement (DTE)
    • San Jose, CA
    • Walker K M, Sterne D F, Badger M L, et al. Confining root programs with domain and type enforcement (DTE). In: Proceedings of 1996 Usenix Security Symposium, San Jose, CA, 1996. Available at http://www.usenix.org/publications/ library/proceedings/sec96/walker.html.
    • (1996) Proceedings of 1996 Usenix Security Symposium
    • Walker, K.M.1    Sterne, D.F.2    Badger, M.L.3
  • 16
    • 84957865065 scopus 로고    scopus 로고
    • An approach to dynamic domain and type enforcement
    • Proceedings of the 2nd Australasian Conference on Information Security and Privacy, July
    • Tidswell J E, Potter J M. An approach to dynamic domain and type enforcement, Lecture Notes in Computer Science, Volume 1270. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy, July 1997, 26-37
    • (1997) Lecture Notes in Computer Science , vol.1270 , pp. 26-37
    • Tidswell, J.E.1    Potter, J.M.2
  • 17
    • 33749470823 scopus 로고
    • Secure computing: The secure Ada target approach
    • Turn R, ed. Boston/London: Artech House, INC
    • Boebert W E, Kain R Y, Young W D. Secure computing: The secure Ada target approach, Advance in Computer System Security. Volume 3. Turn R, ed. Boston/London: Artech House, INC, 1988
    • (1988) Advance in Computer System Security , vol.3
    • Boebert, W.E.1    Kain, R.Y.2    Young, W.D.3
  • 18
    • 33749494089 scopus 로고
    • Computer viruses: Theory and experiments
    • Turn R, ed. Boston/London: Artech House, INC
    • Cohen F. Computer viruses: theory and experiments, Advance in Computer System Security, Volume 3, Turn R, ed. Boston/London: Artech House, INC, 1988
    • (1988) Advance in Computer System Security , vol.3
    • Cohen, F.1
  • 20
    • 1242282117 scopus 로고
    • Role-based application design and enforcement
    • Jajodia S, Landwehr C E, eds. North-Holland
    • Thomsen D J. Role-based application design and enforcement. In: Jajodia S, Landwehr C E, eds. Database Security, IV: Status and Prospects, North-Holland, 1991. 151-168
    • (1991) Database Security, IV: Status and Prospects , pp. 151-168
    • Thomsen, D.J.1
  • 23
    • 0031703267 scopus 로고    scopus 로고
    • Ensuring continuity during dynamic security policy reconfiguration in DTE
    • Oakland, CA: IEEE Computer Society Press
    • Fraser T, Badger L. Ensuring continuity during dynamic security policy reconfiguration in DTE. In: Proceedings of 1998 IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1998. 15-26
    • (1998) Proceedings of 1998 IEEE Symposium on Research in Security and Privacy , pp. 15-26
    • Fraser, T.1    Badger, L.2
  • 25
    • 33749486488 scopus 로고    scopus 로고
    • Engineering Research Center for Information Security Technology, the technical documentation of the "structured protection class" secure operating system, Mar.
    • Ji Q G, Tang L Y, Sheng Q N, ERCIST OS V4.0 security policy formal model and its applicatons (in Chinese), Engineering Research Center for Information Security Technology, the technical documentation of the "structured protection class" secure operating system, Mar. 2003
    • (2003) ERCIST OS V4.0 Security Policy Formal Model and Its Applicatons (in Chinese)
    • Ji, Q.G.1    Tang, L.Y.2    Sheng, Q.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.