-
1
-
-
50949107802
-
-
Fairplay. http://en.wikipedia.org/wiki/FairPlay.
-
Fairplay
-
-
-
2
-
-
50949132142
-
-
Windows media digital rights management DRM
-
Windows media digital rights management (DRM). http://www.microsoft.com/ windows/windowsmedia/drm/default.aspx.
-
-
-
-
3
-
-
50949097568
-
-
Web Services Security: SOAP Message Security 1.1. OASIS Web Service Security TC, 2004.
-
Web Services Security: SOAP Message Security 1.1. OASIS Web Service Security TC, 2004.
-
-
-
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, and B. Lampson. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
-
5
-
-
50949112228
-
-
J. P. Anderson. Computer security technology planning study II, ESD-TR-73-51, II, electronic systems division, air force systems command, hanscom field, bedford, MA 01730. http://csrc.nist.gov/publications/history/ ande72.pdf, Oct. 1972.
-
J. P. Anderson. Computer security technology planning study volume II, ESD-TR-73-51, vol. II, electronic systems division, air force systems command, hanscom field, bedford, MA 01730. http://csrc.nist.gov/publications/history/ ande72.pdf, Oct. 1972.
-
-
-
-
7
-
-
0003400257
-
Mitre Corp. Report No.M74-244, Bedford, Mass
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Mitre Corp. Report No.M74-244, Bedford, Mass., 1975.
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
8
-
-
0003400255
-
Integrity consideration for secure computer system
-
Technical report, Mitre Corp. Report TR-3153, Bedford, Mass
-
K. J. Biba. Integrity consideration for secure computer system. Technical report, Mitre Corp. Report TR-3153, Bedford, Mass., 1977.
-
(1977)
-
-
Biba, K.J.1
-
9
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
11
-
-
0003969635
-
Department of Defense Trusted Computer Systems Evaluation Criteria
-
Department of Defense National Computer Security Center, December
-
Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria, December 1985. DoD 5200.28-STD.
-
(1985)
DoD 5200.28-STD
-
-
-
12
-
-
0035474388
-
Building the ibm 4758 secure coprocessor
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S.W. Smith, and S.Weingart. Building the ibm 4758 secure coprocessor. IEEE Computer, (10):57-66, 2001.
-
(2001)
IEEE Computer
, vol.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
14
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: assigning roles to strangers. In Proc. of IEEE Symposium on Security and Privacy, pages 2-14, 2000.
-
(2000)
Proc. of IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
17
-
-
17544394392
-
Computer security in the real world
-
June
-
B. Lampson. Computer security in the real world. IEEE Computer, (6):37-46, June 2004.
-
(2004)
IEEE Computer
, vol.6
, pp. 37-46
-
-
Lampson, B.1
-
20
-
-
0003262137
-
The inevitability of failure: The flawed assumption of computer security in modern computing environments
-
October
-
P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. The inevitability of failure: The flawed assumption of computer security in modern computing environments. In Proceedings of the National Information Systems Security Conference, October 1998.
-
(1998)
Proceedings of the National Information Systems Security Conference
-
-
Loscocco, P.1
Smalley, S.2
Muckelbauer, P.3
Taylor, R.4
Turner, J.5
Farrell, J.6
-
25
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, pages 223-238, 2004.
-
(2004)
USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
26
-
-
0037252218
-
Good-enough security: Toward a pragmatic business-driven discipline
-
R. Sandhu. Good-enough security: Toward a pragmatic business-driven discipline. IEEE Internet Computing, (1):66-68, 2003.
-
(2003)
IEEE Internet Computing
, vol.1
, pp. 66-68
-
-
Sandhu, R.1
-
27
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
R. Sandhu, K. Ranganathan, and X. Zhang. Secure information sharing enabled by trusted computing and PEI models. In Proc. of ACM Symposium on Information, Computer, and Communication Security, 2006.
-
(2006)
Proc. of ACM Symposium on Information, Computer, and Communication Security
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
|