-
2
-
-
0005314068
-
Integrity in automated information systems
-
U. S. National Computer Security Center
-
T Mayfield, J E Roskos, S R Welke, J M Boone. Integrity in Automated information Systems[R]. U. S. National Computer Security Center, 1991, 79-91.
-
(1991)
, pp. 79-91
-
-
Mayfield, T.1
Roskos, J.E.2
Welke, S.R.3
Boone, J.M.4
-
3
-
-
0023859517
-
Using mandatory integrity to enforce 'commercial' security
-
Oakland, CA: IEEE press
-
T Lee. Using mandatory integrity to enforce 'commercial' security[A]. In Proceedings of 1988 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1988. 140-146.
-
(1988)
Proceedings of 1988 IEEE Symposium on Security and Privacy
, pp. 140-146
-
-
Lee, T.1
-
4
-
-
0023829318
-
Implementing commercial data integrity with secure capabilities
-
Oakland, CA: IEEE press
-
P K Karger. Implementing commercial data integrity with secure capabilities[A]. In Proceedings of 1988 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1988, 130-139.
-
(1988)
Proceedings of 1988 IEEE Symposium on Security and Privacy
, pp. 130-139
-
-
Karger, P.K.1
-
5
-
-
0038890766
-
Approximating clark-wilson 'access triples' with basic UNIX controls
-
Santa Clara, CA: USENIX press
-
W Polk. Approximating clark-wilson 'access triples' with basic UNIX controls[A]. In Proceedings of the 4th USENIX UNIX Security Symposium[C]. Santa Clara, CA: USENIX press, 1993. 145-154.
-
(1993)
Proceedings of the 4th USENIX UNIX Security Symposium
, pp. 145-154
-
-
Polk, W.1
-
6
-
-
6444234162
-
An approach to enforcing clark-wilson model in role-based access control
-
LIANG B, SHI W C, SUN Y F, SUN B. An approach to enforcing clark-wilson model in role-based access control[J]. Chinese Journal of Electronics, 2004, 13(4): 596-599.
-
(2004)
Chinese Journal of Electronics
, vol.13
, Issue.4
, pp. 596-599
-
-
Liang, B.1
Shi, W.C.2
Sun, Y.F.3
Sun, B.4
-
8
-
-
37449026795
-
Research on commercial security policy and its formal analysis
-
Beijing: Institute of Software, the Chinese Academy of Sciences. in Chinese
-
WEN Hongzi. Research on Commercial Security Policy and its Formal Analysis[D]. Beijing: Institute of Software, the Chinese Academy of Sciences. 2004. (in Chinese with English abstract)
-
(2004)
-
-
Wen, H.1
-
9
-
-
85023476444
-
A comparison of type enforcement and unix setuid implementation of well-formed transactions
-
Tucson, Arizona: IEEE press
-
D J Thomsen, J T Haigh. A comparison of type enforcement and unix setuid implementation of well-formed transactions[A]. In Proceedings of 6th Annual Computer Security Applications Conference[C]. Tucson, Arizona: IEEE press, 1990. 304-312.
-
(1990)
Proceedings of 6th Annual Computer Security Applications Conference
, pp. 304-312
-
-
Thomsen, D.J.1
Haigh, J.T.2
-
12
-
-
33748161983
-
Configuring the SELinux policy
-
NAI Labs Rep. 02-007
-
SMALLEY, S. 2002. Configuring the SELinux policy[R]. NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002.
-
(2002)
-
-
Smalley, S.1
-
14
-
-
0003969633
-
Trusted computer system evaluation criteria
-
National Computer Security Center, Dept of Defense, No.DOD 5200. 28-STD
-
National Computer Security Center. Trusted Computer System Evaluation Criteria[S]. Dept of Defense, No.DOD 5200. 28-STD.
-
-
-
-
15
-
-
0031703267
-
Ensuring continuity during dynamic security policy reconfiguration in DTE
-
Oakland, CA: IEEE press
-
T Fraser, L Badger. Ensuring continuity during dynamic security policy reconfiguration in DTE[A]. In Proceedings of 1998 IEEE Symposium on Security and Privacy[C]. Oakland, CA: IEEE press, 1998. 15-26.
-
(1998)
Proceedings of 1998 IEEE Symposium on Security and Privacy
, pp. 15-26
-
-
Fraser, T.1
Badger, L.2
-
19
-
-
6444239031
-
-
In Database Security, IV: Status and Prospects, Jajodia S. and Carl L.E.(ed.), Amsterdam: North-Holland
-
D J Thomsen. Role-Based Application Design and Enforcement[M]. In Database Security, IV: Status and Prospects (eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland, 1991. 151-168.
-
(1991)
Role-Based Application Design and Enforcement
, pp. 151-168
-
-
Thomsen, D.J.1
|