메뉴 건너뛰기




Volumn 1146, Issue , 1996, Pages 80-98

A multilevel security model for distributed object systems

Author keywords

[No Author keywords available]

Indexed keywords

OBJECT ORIENTED PROGRAMMING; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 38149001585     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61770-1_29     Document Type: Conference Paper
Times cited : (1)

References (14)
  • 2
    • 84949847622 scopus 로고
    • 5200.28-STD, December
    • "U.S. Departeinent of Defense Trusted Computer Security Evaluation Criteria (TCSEC)." 5200.28-STD, December 1985.
    • (1985)
  • 3
    • 0019608720 scopus 로고
    • Formal Models for Computer Security
    • September
    • C. Landwehr, "Formal Models for Computer Security," ACM Computing Surveys, vol. 3, pp. 247-278, September 1981.
    • (1981) ACM Computing Surveys , vol.3 , pp. 247-278
    • Landwehr, C.1
  • 4
    • 0028755016 scopus 로고
    • On the Validity of the Bell-LaPadula Model
    • E. R. Lindgreen and I. Herschberg, "On the Validity of the Bell-LaPadula Model," Computers and Security, vol. 13, pp. 317-333, 1994.
    • (1994) Computers and Security , vol.13 , pp. 317-333
    • Lindgreen, E.R.1    Herschberg, I.2
  • 5
    • 0023218630 scopus 로고
    • Reasoning about Security Models
    • IEEE Computer Society Press, (Oakland, California(USA))
    • J. McLean, "Reasoning about Security Models," in Proc. of Symposium on Research in Security and Privacy, IEEE Computer Society Press, (Oakland, California(USA)), pp. 123-131, 1987.
    • (1987) Proc. Of Symposium on Research in Security and Privacy , pp. 123-131
    • McLean, J.1
  • 6
    • 0023861504 scopus 로고
    • Concerning 'Modeling' of Computer Security
    • IEEE Computer Society Press, (Oakland, California(USA))
    • D. Bell, "Concerning 'Modeling' of Computer Security," in Proc. of Symposium on Research in Security and Privacy, IEEE Computer Society Press, (Oakland, California(USA)), pp. 8-13, 1988.
    • (1988) Proc. Of Symposium on Research in Security and Privacy , pp. 8-13
    • Bell, D.1
  • 7
    • 0023209778 scopus 로고
    • Exploiting the Dual Nature of Sensitivity Labels
    • [EEE Computer Society Press, (Oakland, California(USA))
    • J. Woodward, "Exploiting the Dual Nature of Sensitivity Labels," in Proc. of Symposium on Research in Security and Privacy, [EEE Computer Society Press, (Oakland, California(USA)), pp. 23-30, 1987.
    • (1987) Proc. Of Symposium on Research in Security and Privacy , pp. 23-30
    • Woodward, J.1
  • 8
    • 0020778471 scopus 로고
    • Scomp: A Solution to the Multilevel Security Problem
    • July
    • L. Fraim, "Scomp: A Solution to the Multilevel Security Problem," IEEE Computer, vol. 16, pp. 26-34, July 1983.
    • (1983) IEEE Computer , vol.16 , pp. 26-34
    • Fraim, L.1
  • 9
    • 58049145786 scopus 로고
    • Implementing Secure Dependencies Over a Network by Designing a Distributed Security Subsystem
    • (Brighton(UK)), November
    • B. d'Ausbourg, "Implementing Secure Dependencies Over a Network by Designing a Distributed Security Subsystem," in Proc. of European Symposium on Research in Computer Security, (Brighton(UK)), pp. 249-266, November 1994.
    • (1994) Proc. Of European Symposium on Research in Computer Security , pp. 249-266
    • D’ausbourg, B.1
  • 11
    • 0024751899 scopus 로고
    • SODA: A Secure Object-oriented Database System
    • T. Keefe, W. Tsai, and M. Thuraisingham, "SODA: a Secure Object-oriented Database System," Computers and Security, vol. 8, no. 6, pp. 517-533, 1989.
    • (1989) Computers and Security , vol.8 , Issue.6 , pp. 517-533
    • Keefe, T.1    Tsai, W.2    Thuraisingham, M.3
  • 12
    • 0025065897 scopus 로고
    • Integrating an Object-Oriented Data Model with Multi- Level Security
    • (Oakland, CA), May
    • S. Jajodia and B. Kogan, "Integrating an Object-Oriented Data Model with Multi- Level Security," in Proc. of the 1990 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 48-69, May 1990.
    • (1990) Proc. Of the 1990 IEEE Symposium on Security and Privacy , pp. 48-69
    • Jajodia, S.1    Kogan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.