-
1
-
-
0004200684
-
Computer security technology planning study
-
AFSC, Hanscom AFB, Bedford, MA, Oct. AD-758 206, ESD/AFSC
-
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, AFSC, Hanscom AFB, Bedford, MA, Oct. 1972. AD-758 206, ESD/AFSC.
-
(1972)
Technical Report
, vol.ESD-TR-73-51
-
-
Anderson, J.P.1
-
2
-
-
0003400257
-
Secure computer systems: Mathematical foundations and model
-
Mitre Corporation, Bedford MA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corporation, Bedford MA, 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
0003282331
-
A practical alternative to hierarchical integrity policies
-
Gaithersburg, MD
-
W. E. Boebert and R. Kain. A practical alternative to hierarchical integrity policies. In 8th National Computer Security Conference, pages 18-27, Gaithersburg, MD, 1985.
-
(1985)
8th National Computer Security Conference
, pp. 18-27
-
-
Boebert, W.E.1
Kain, R.2
-
5
-
-
3543134498
-
-
PhD thesis, Birkbeck College, Univ. of London, UK
-
J. Crampton. Authorizations and Antichians. PhD thesis, Birkbeck College, Univ. of London, UK, 2002.
-
(2002)
Authorizations and Antichians
-
-
Crampton, J.1
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0016984825
-
Protection in operating systems
-
Aug.
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
12
-
-
85008430937
-
A graph-based formalism for RBAC
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. A graph-based formalism for RBAC. ACM Transactions on Information and System Security (TISSEC), 5(3):332-365, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
16
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
May
-
S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and Systems Security, 3(2):85-106, May 2000.
-
(2000)
ACM Transactions on Information and Systems Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
17
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2(1):105-135, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
19
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
20
-
-
0019548112
-
Formal models of capability-based protection systems
-
Mar.
-
L. Snyder. Formal models of capability-based protection systems. IEEE Trans. Comput., C-30(3):172-181, Mar. 1981.
-
(1981)
IEEE Trans. Comput.
, vol.C-30
, Issue.3
, pp. 172-181
-
-
Snyder, L.1
-
21
-
-
84944079173
-
Safety analysis of the dynamic-typed access matrix model
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Toulouse, France, Springer-Verlag
-
M. Soshi. Safety analysis of the dynamic-typed access matrix model. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, 6th European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 106-121, Toulouse, France, 2000. Springer-Verlag.
-
(2000)
6th European Symposium on Research in Computer Security (ESORICS 2000), Volume 1895 of Lecture Notes in Computer Science
, vol.1895
, pp. 106-121
-
-
Soshi, M.1
-
22
-
-
0034447078
-
An access control model for simplifying constraint expression
-
S. Jajodia and P. Samarati, editors, N.Y., Nov. 1-4 ACM Press
-
J. Tidswell and T. Jaeger. An access control model for simplifying constraint expression. In S. Jajodia and P. Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00), pages 154-163, N.Y., Nov. 1-4 2000. ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00)
, pp. 154-163
-
-
Tidswell, J.1
Jaeger, T.2
-
24
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
San Francisco, Ca., Aug.
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th Usenix Security Symposium, San Francisco, Ca., Aug. 2002.
-
(2002)
Proceedings of the 11th Usenix Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|