-
2
-
-
84949847622
-
-
5200.28-STD, December
-
"U.S. Departeinent of Defense Trusted Computer Security Evaluation Criteria (TCSEC)." 5200.28-STD, December 1985.
-
(1985)
-
-
-
3
-
-
0019608720
-
Formal Models for Computer Security
-
September
-
C. Landwehr, "Formal Models for Computer Security," ACM Computing Surveys, vol. 3, pp. 247-278, September 1981.
-
(1981)
ACM Computing Surveys
, vol.3
, pp. 247-278
-
-
Landwehr, C.1
-
4
-
-
0028755016
-
On the Validity of the Bell-LaPadula Model
-
E. R. Lindgreen and I. Herschberg, "On the Validity of the Bell-LaPadula Model," Computers and Security, vol. 13, pp. 317-333, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 317-333
-
-
Lindgreen, E.R.1
Herschberg, I.2
-
5
-
-
0023218630
-
Reasoning about Security Models
-
IEEE Computer Society Press, (Oakland, California(USA))
-
J. McLean, "Reasoning about Security Models," in Proc. of Symposium on Research in Security and Privacy, IEEE Computer Society Press, (Oakland, California(USA)), pp. 123-131, 1987.
-
(1987)
Proc. Of Symposium on Research in Security and Privacy
, pp. 123-131
-
-
McLean, J.1
-
6
-
-
0023861504
-
Concerning 'Modeling' of Computer Security
-
IEEE Computer Society Press, (Oakland, California(USA))
-
D. Bell, "Concerning 'Modeling' of Computer Security," in Proc. of Symposium on Research in Security and Privacy, IEEE Computer Society Press, (Oakland, California(USA)), pp. 8-13, 1988.
-
(1988)
Proc. Of Symposium on Research in Security and Privacy
, pp. 8-13
-
-
Bell, D.1
-
7
-
-
0023209778
-
Exploiting the Dual Nature of Sensitivity Labels
-
[EEE Computer Society Press, (Oakland, California(USA))
-
J. Woodward, "Exploiting the Dual Nature of Sensitivity Labels," in Proc. of Symposium on Research in Security and Privacy, [EEE Computer Society Press, (Oakland, California(USA)), pp. 23-30, 1987.
-
(1987)
Proc. Of Symposium on Research in Security and Privacy
, pp. 23-30
-
-
Woodward, J.1
-
8
-
-
0020778471
-
Scomp: A Solution to the Multilevel Security Problem
-
July
-
L. Fraim, "Scomp: A Solution to the Multilevel Security Problem," IEEE Computer, vol. 16, pp. 26-34, July 1983.
-
(1983)
IEEE Computer
, vol.16
, pp. 26-34
-
-
Fraim, L.1
-
9
-
-
58049145786
-
Implementing Secure Dependencies Over a Network by Designing a Distributed Security Subsystem
-
(Brighton(UK)), November
-
B. d'Ausbourg, "Implementing Secure Dependencies Over a Network by Designing a Distributed Security Subsystem," in Proc. of European Symposium on Research in Computer Security, (Brighton(UK)), pp. 249-266, November 1994.
-
(1994)
Proc. Of European Symposium on Research in Computer Security
, pp. 249-266
-
-
D’ausbourg, B.1
-
10
-
-
0344161398
-
Some Fault- Tolerant Aspects of the Chorus Distributed System
-
(Denver, Colorado), May
-
J. Banino, J. Fabre, M. Guillemont, G. Morisset, and M. Rozier, "Some Fault- Tolerant Aspects of the Chorus Distributed System," in Proc. of 5th International Conference on Distributed Computing Systems, (Denver, Colorado), pp. 430-437, May 1985.
-
(1985)
Proc. Of 5Th International Conference on Distributed Computing Systems
, pp. 430-437
-
-
Banino, J.1
Fabre, J.2
Guillemont, M.3
Morisset, G.4
Rozier, M.5
-
11
-
-
0024751899
-
SODA: A Secure Object-oriented Database System
-
T. Keefe, W. Tsai, and M. Thuraisingham, "SODA: a Secure Object-oriented Database System," Computers and Security, vol. 8, no. 6, pp. 517-533, 1989.
-
(1989)
Computers and Security
, vol.8
, Issue.6
, pp. 517-533
-
-
Keefe, T.1
Tsai, W.2
Thuraisingham, M.3
-
12
-
-
0025065897
-
Integrating an Object-Oriented Data Model with Multi- Level Security
-
(Oakland, CA), May
-
S. Jajodia and B. Kogan, "Integrating an Object-Oriented Data Model with Multi- Level Security," in Proc. of the 1990 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 48-69, May 1990.
-
(1990)
Proc. Of the 1990 IEEE Symposium on Security and Privacy
, pp. 48-69
-
-
Jajodia, S.1
Kogan, B.2
-
13
-
-
0027710821
-
High Assurance Discretionary Access Control for Object Bases
-
(Fairfax, Virginia (USA)), November
-
E. Bertino, P. Samarati, and S. Jajodia, "High Assurance Discretionary Access Control for Object Bases," in Proc. of 1st ACM Conference on Computer and Communications Security, (Fairfax, Virginia (USA)), pp. 140-150, November 1993.
-
(1993)
Proc. Of 1St ACM Conference on Computer and Communications Security
, pp. 140-150
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
|