메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 337-351

Looking back at the bell-La padula model

(1)  Bell, David Elliott a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

CONCEPTUAL TOOLS; SECURITY MODELS; SECURITY PRINCIPLES;

EID: 33846272388     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.37     Document Type: Conference Paper
Times cited : (92)

References (44)
  • 1
    • 33846278827 scopus 로고
    • ESD-TR-73-51, AD-758 206, ESD/AFSC, Hanscom AFB, MA, October
    • J. P. Anderson, "Computer Security Technology Planning Study," ESD-TR-73-51, Vol. I, AD-758 206, ESD/AFSC, Hanscom AFB, MA, October 1972, p. 4.
    • (1972) Computer Security Technology Planning Study , vol.1 , pp. 4
    • Anderson, J.P.1
  • 3
    • 84976781807 scopus 로고
    • Reflections on Trusting Trust
    • August
    • Ken Thompson, "Reflections on Trusting Trust," Comm ACM, August 1984, 27(8), 761-763.
    • (1984) Comm ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 4
    • 33846334286 scopus 로고
    • On Trusting Trust
    • November
    • Ken Thompson, "On Trusting Trust," Unix Review, November 1989, 7(11), 70-74.
    • (1989) Unix Review , vol.7 , Issue.11 , pp. 70-74
    • Thompson, K.1
  • 7
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • September
    • Jerome H. Saltzer, Michael D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE, 63(9) (September 1975), pp. 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 9
    • 3943068905 scopus 로고
    • Primitive Models for Computer Security
    • Electronic Systems Division, Hanscom AFB, MA, January
    • K. G. Walter et al., "Primitive Models for Computer Security," ESD-TR-74-117, Electronic Systems Division, Hanscom AFB, MA, January, 1974.
    • (1974) ESD-TR-74-117
    • Walter, K.G.1
  • 17
    • 0003605887 scopus 로고
    • Doubleday: New York, NY
    • Clifford Stoll. The Cuckoo's Egg. Doubleday: New York, NY, 1989.
    • (1989) The Cuckoo's Egg
    • Stoll, C.1
  • 18
    • 84948969398 scopus 로고    scopus 로고
    • Thirty Years Later: Lessons from the Multics Security Evaluation
    • Las Vegas, NV, December
    • th ACSAC, Las Vegas, NV, December 2002, 119-126.
    • (2002) th ACSAC , pp. 119-126
    • Karger, P.1    Schell, R.R.2
  • 20
    • 0018320025 scopus 로고
    • KSOS-The design of a secure operating system
    • AFIPS NCC, v
    • E. J. McCauley and P. J. Drongowski, "KSOS-The design of a secure operating system," Proceedings, AFIPS 1979 NCC, v48, 345-353.
    • (1979) Proceedings , vol.48 , pp. 345-353
    • McCauley, E.J.1    Drongowski, P.J.2
  • 21
    • 0347229432 scopus 로고    scopus 로고
    • A provably secure operating system: The system, its applications, and proofs
    • Technical Report CSL-116, SRI International, 1980
    • P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson, "A provably secure operating system: The system, its applications, and proofs," Technical Report CSL-116, SRI International, 1980.
    • Neumann, P.G.1    Boyer, R.S.2    Feiertag, R.J.3    Levitt, K.N.4    Robinson, L.5
  • 22
    • 33846270181 scopus 로고    scopus 로고
    • Marvin Schaefer, R. R. Linde, et al., Program Confinement in KVM/370, Proceedings, ACM National Conference, Seattle, October, 1977.
    • Marvin Schaefer, R. R. Linde, et al., "Program Confinement in KVM/370," Proceedings, ACM National Conference, Seattle, October, 1977.
  • 23
    • 0016081584 scopus 로고
    • Protection and the Control of Information in Multics
    • July
    • Jerome Saltzer, "Protection and the Control of Information in Multics," Comm. ACM 17(7), July 1974, 388-402.
    • (1974) Comm. ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.1
  • 24
    • 0012296562 scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria, December
    • Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.
    • (1985) DoD 5200.28-STD
  • 26
    • 0025137215 scopus 로고    scopus 로고
    • Paul Karger et al., A VMM Security Kernel for the VAX Architecture, Proceedings, 1990 IEEE Symposium on Security and Privacy, Oakland, CA, 7-9 May 1990, 2-19.
    • Paul Karger et al., "A VMM Security Kernel for the VAX Architecture," Proceedings, 1990 IEEE Symposium on Security and Privacy, Oakland, CA, 7-9 May 1990, 2-19.
  • 27
    • 0023266943 scopus 로고    scopus 로고
    • David Clark and David Wilson, A Comparison of Commercial and Military Computer Security Policies, Proceedings, 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 27-29 April 1987, 184-194.
    • David Clark and David Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proceedings, 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 27-29 April 1987, 184-194.
  • 28
    • 0023859517 scopus 로고    scopus 로고
    • T. M. P. Lee, Using Mandatory Integrity to Enforce 'Commercial' Security, Proceedings, 1988 IEEE Symposium on Security and Privacy, Oakland, CA, April 1988, 140-146.
    • T. M. P. Lee, "Using Mandatory Integrity to Enforce 'Commercial' Security," Proceedings, 1988 IEEE Symposium on Security and Privacy, Oakland, CA, April 1988, 140-146.
  • 29
    • 33846268617 scopus 로고    scopus 로고
    • William R. Shockley, Implementing the Clark/Wilson Integrity Policy Using Current Technology, Proceedings, 11th National Computer Security Conference, Baltimore, Maryland, October 1988, 29-37.
    • William R. Shockley, "Implementing the Clark/Wilson Integrity Policy Using Current Technology," Proceedings, 11th National Computer Security Conference, Baltimore, Maryland, October 1988, 29-37.
  • 30
    • 0024663219 scopus 로고    scopus 로고
    • David Brewer and Michael Nash, The Chinese Wall Security Policy, Proceedings, 1989 IEEE Symposium on Security and Privacy, Oakland, CA, May 1989, 206-214.
    • David Brewer and Michael Nash, "The Chinese Wall Security Policy," Proceedings, 1989 IEEE Symposium on Security and Privacy, Oakland, CA, May 1989, 206-214.
  • 33
    • 33846285579 scopus 로고    scopus 로고
    • th National Computer Security Conference, Washington, DC, 1-4 October 1990, 333-339.
    • th National Computer Security Conference, Washington, DC, 1-4 October 1990, 333-339.
  • 34
    • 0026851778 scopus 로고    scopus 로고
    • Clark Weissman, BLACKER: Security for the DDN, Examples of Al Security Engineering Trades, Proceedings, 1992 IEEE Computer Security Symposium on Research in Security and Privacy, 4-6 May 1992, Oakland, CA, 286-292.
    • Clark Weissman, "BLACKER: Security for the DDN, Examples of Al Security Engineering Trades," Proceedings, 1992 IEEE Computer Security Symposium on Research in Security and Privacy, 4-6 May 1992, Oakland, CA, 286-292.
  • 35
    • 0022863501 scopus 로고    scopus 로고
    • D. Elliott Bell, Secure Computer Systems: A Network Interpretation, Proceedings, Second Aerospace Computer Conference, McLean, VA, 2-4 December 1986, 32-39.
    • D. Elliott Bell, "Secure Computer Systems: A Network Interpretation", Proceedings, Second Aerospace Computer Conference, McLean, VA, 2-4 December 1986, 32-39.
  • 36
    • 33846308312 scopus 로고    scopus 로고
    • TNI, op. cit., Appendix A.
    • TNI, op. cit., Appendix A.
  • 37
    • 0004190631 scopus 로고
    • 1st ed, American Mathematical Society: Ann Arbor, Michigan
    • st ed.), American Mathematical Society: Ann Arbor, Michigan, 1948.
    • (1948) Lattice Theory
    • Birkhoff, G.1
  • 39
    • 33846330000 scopus 로고    scopus 로고
    • th National Computer Security Conference, Washington, DC, 1-4 October 1990, 165-171.
    • th National Computer Security Conference, Washington, DC, 1-4 October 1990, 165-171.
  • 40
    • 33846311572 scopus 로고    scopus 로고
    • th National Computer Security Conference, Washington, DC, 1-4 October 1991, 456-471.
    • th National Computer Security Conference, Washington, DC, 1-4 October 1991, 456-471.
  • 44
    • 33846310618 scopus 로고    scopus 로고
    • Dorothy Denning, et al., A Multilevel Relational Data Model, Proceedings, 1987 IEEE Computer Security Symposium on Research in Security and Privacy, 27-29 April 1987, Oakland, CA, 220-242.
    • Dorothy Denning, et al., "A Multilevel Relational Data Model," Proceedings, 1987 IEEE Computer Security Symposium on Research in Security and Privacy, 27-29 April 1987, Oakland, CA, 220-242.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.