메뉴 건너뛰기




Volumn , Issue , 2007, Pages 205-218

From Trusted to Secure: Building and Executing Applications that Enforce System Security

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCIAL OPERATING SYSTEMS; DATA CONFIDENTIALITY; DATA INTEGRITY; ENFORCER SYSTEM; MANDATORY ACCESS CONTROL; SECURITY LEVEL; SENSITIVE DATAS; SYSTEM SECURITY; SYSTEM SERVICES; SYSTEM-WIDE DATA;

EID: 34548017123     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (37)
  • 3
    • 0003400251 scopus 로고
    • Technical Report ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, March
    • D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, March 1976.
    • (1976) Secure computer system: Unified exposition and Multics interpretation
    • Bell, D. E.1    LaPadula, L. J.2
  • 4
    • 0003400255 scopus 로고
    • Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324)
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.).
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K. J.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.1
  • 15
    • 84968352943 scopus 로고    scopus 로고
    • Policy management using access control spaces
    • T. Jaeger, A. Edwards, and X. Zhang. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur., 6(3):327-364, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.3 , pp. 327-364
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 16
    • 39049160206 scopus 로고    scopus 로고
    • A general dynamic information flow tracking framework for security applications
    • L. Lam and T. Chiuch. A general dynamic information flow tracking framework for security applications. In Applied Computer Security Associates ACSAC, 2006.
    • (2006) Applied Computer Security Associates ACSAC
    • Lam, L.1    Chiuch, T.2
  • 18
    • 84872691539 scopus 로고    scopus 로고
    • A Unifying Approach to the Security of Distributed and Multi-Threaded Programs
    • H. Mantel and A. Sabelfeld. A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. Journal of Computer Security, 2002.
    • (2002) Journal of Computer Security
    • Mantel, H.1    Sabelfeld, A.2
  • 22
    • 0004001006 scopus 로고    scopus 로고
    • Technical Report MIT/LCS/TR-783, Massachussetts Institute of Technology, January Ph.D. thesis
    • A. C. Myers. Mostly-Static Decentralized Information Flow Control. Technical Report MIT/LCS/TR-783, Massachussetts Institute of Technology, January 1999. Ph.D. thesis.
    • (1999) Mostly-Static Decentralized Information Flow Control
    • Myers, A. C.1
  • 29
    • 85160764329 scopus 로고    scopus 로고
    • Embedded Java with GCJ
    • May
    • G. Sally. Embedded Java with GCJ. Linux Journal, (145), May 2006.
    • (2006) Linux Journal , Issue.145
    • Sally, G.1
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.