메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 56-67

A layered design of discretionary access controls with decidable safety properties

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; DISCRETIONARY ACCESS CONTROLS (DAC); PARAMETERIZATION; PROTECTION SEMANTICS;

EID: 3543115068     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301315     Document Type: Conference Paper
Times cited : (24)

References (24)
  • 1
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • AFSC, Hanscom AFB, Bedford, MA, Oct. AD-758 206, ESD/AFSC
    • J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, AFSC, Hanscom AFB, Bedford, MA, Oct. 1972. AD-758 206, ESD/AFSC.
    • (1972) Technical Report , vol.ESD-TR-73-51
    • Anderson, J.P.1
  • 2
    • 0003400257 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Mitre Corporation, Bedford MA
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corporation, Bedford MA, 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.E.1    LaPadula, L.J.2
  • 3
    • 0003282331 scopus 로고
    • A practical alternative to hierarchical integrity policies
    • Gaithersburg, MD
    • W. E. Boebert and R. Kain. A practical alternative to hierarchical integrity policies. In 8th National Computer Security Conference, pages 18-27, Gaithersburg, MD, 1985.
    • (1985) 8th National Computer Security Conference , pp. 18-27
    • Boebert, W.E.1    Kain, R.2
  • 5
    • 3543134498 scopus 로고    scopus 로고
    • PhD thesis, Birkbeck College, Univ. of London, UK
    • J. Crampton. Authorizations and Antichians. PhD thesis, Birkbeck College, Univ. of London, UK, 2002.
    • (2002) Authorizations and Antichians
    • Crampton, J.1
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 16
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and Systems Security, 3(2):85-106, May 2000.
    • (2000) ACM Transactions on Information and Systems Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 20
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • Mar.
    • L. Snyder. Formal models of capability-based protection systems. IEEE Trans. Comput., C-30(3):172-181, Mar. 1981.
    • (1981) IEEE Trans. Comput. , vol.C-30 , Issue.3 , pp. 172-181
    • Snyder, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.