메뉴 건너뛰기




Volumn 36, Issue 2, 2008, Pages 216-223

Approach to enforcing clark-wilson model based on type enforcement

Author keywords

Clark Wilson model; Integrity; Separation of duty; Type Enforcement (TE)

Indexed keywords

ACCESS CONTROL; AUTHENTICATION;

EID: 41649120000     PISSN: 03722112     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (19)
  • 2
    • 0005314068 scopus 로고
    • Integrity in automated information systems
    • U. S. National Computer Security Center
    • T Mayfield, J E Roskos, S R Welke, J M Boone. Integrity in Automated information Systems[R]. U. S. National Computer Security Center, 1991, 79-91.
    • (1991) , pp. 79-91
    • Mayfield, T.1    Roskos, J.E.2    Welke, S.R.3    Boone, J.M.4
  • 3
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce 'commercial' security
    • Oakland, CA: IEEE press
    • T Lee. Using mandatory integrity to enforce 'commercial' security[A]. In Proceedings of 1988 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1988. 140-146.
    • (1988) Proceedings of 1988 IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.1
  • 4
    • 0023829318 scopus 로고
    • Implementing commercial data integrity with secure capabilities
    • Oakland, CA: IEEE press
    • P K Karger. Implementing commercial data integrity with secure capabilities[A]. In Proceedings of 1988 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1988, 130-139.
    • (1988) Proceedings of 1988 IEEE Symposium on Security and Privacy , pp. 130-139
    • Karger, P.K.1
  • 5
    • 0038890766 scopus 로고
    • Approximating clark-wilson 'access triples' with basic UNIX controls
    • Santa Clara, CA: USENIX press
    • W Polk. Approximating clark-wilson 'access triples' with basic UNIX controls[A]. In Proceedings of the 4th USENIX UNIX Security Symposium[C]. Santa Clara, CA: USENIX press, 1993. 145-154.
    • (1993) Proceedings of the 4th USENIX UNIX Security Symposium , pp. 145-154
    • Polk, W.1
  • 6
    • 6444234162 scopus 로고    scopus 로고
    • An approach to enforcing clark-wilson model in role-based access control
    • LIANG B, SHI W C, SUN Y F, SUN B. An approach to enforcing clark-wilson model in role-based access control[J]. Chinese Journal of Electronics, 2004, 13(4): 596-599.
    • (2004) Chinese Journal of Electronics , vol.13 , Issue.4 , pp. 596-599
    • Liang, B.1    Shi, W.C.2    Sun, Y.F.3    Sun, B.4
  • 8
    • 37449026795 scopus 로고    scopus 로고
    • Research on commercial security policy and its formal analysis
    • Beijing: Institute of Software, the Chinese Academy of Sciences. in Chinese
    • WEN Hongzi. Research on Commercial Security Policy and its Formal Analysis[D]. Beijing: Institute of Software, the Chinese Academy of Sciences. 2004. (in Chinese with English abstract)
    • (2004)
    • Wen, H.1
  • 9
    • 85023476444 scopus 로고
    • A comparison of type enforcement and unix setuid implementation of well-formed transactions
    • Tucson, Arizona: IEEE press
    • D J Thomsen, J T Haigh. A comparison of type enforcement and unix setuid implementation of well-formed transactions[A]. In Proceedings of 6th Annual Computer Security Applications Conference[C]. Tucson, Arizona: IEEE press, 1990. 304-312.
    • (1990) Proceedings of 6th Annual Computer Security Applications Conference , pp. 304-312
    • Thomsen, D.J.1    Haigh, J.T.2
  • 12
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux policy
    • NAI Labs Rep. 02-007
    • SMALLEY, S. 2002. Configuring the SELinux policy[R]. NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002.
    • (2002)
    • Smalley, S.1
  • 14
    • 0003969633 scopus 로고    scopus 로고
    • Trusted computer system evaluation criteria
    • National Computer Security Center, Dept of Defense, No.DOD 5200. 28-STD
    • National Computer Security Center. Trusted Computer System Evaluation Criteria[S]. Dept of Defense, No.DOD 5200. 28-STD.
  • 15
    • 0031703267 scopus 로고    scopus 로고
    • Ensuring continuity during dynamic security policy reconfiguration in DTE
    • Oakland, CA: IEEE press
    • T Fraser, L Badger. Ensuring continuity during dynamic security policy reconfiguration in DTE[A]. In Proceedings of 1998 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1998. 15-26.
    • (1998) Proceedings of 1998 IEEE Symposium on Security and Privacy , pp. 15-26
    • Fraser, T.1    Badger, L.2
  • 19
    • 6444239031 scopus 로고
    • In Database Security, IV: Status and Prospects, Jajodia S. and Carl L.E.(ed.), Amsterdam: North-Holland
    • D J Thomsen. Role-Based Application Design and Enforcement[M]. In Database Security, IV: Status and Prospects (eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland, 1991. 151-168.
    • (1991) Role-Based Application Design and Enforcement , pp. 151-168
    • Thomsen, D.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.