메뉴 건너뛰기




Volumn 16, Issue 5, 2008, Pages 436-448

A multidimensional approach to multilevel security

Author keywords

Data security; Information systems

Indexed keywords

INFORMATION SYSTEMS; SECURITY OF DATA; SENSOR NETWORKS; TELECOMMUNICATION NETWORKS;

EID: 60049087606     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220810920521     Document Type: Article
Times cited : (6)

References (22)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems, mathematical foundations
    • Mitre Corp. Report No. MTR-2547 Mitre Corp. Bedford, MA
    • Bell, D.E. and LaPadula, L.J. (1975), “Secure computer systems, mathematical foundations”, Mitre Corp. Report No. MTR-2547, Mitre Corp., Bedford, MA.
    • (1975)
    • Bell, D.E.1    LaPadula, L.J.2
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Mitre Corp. Report No. MTR-3153 Mitre Corp. Bedford, MA, Bedford, MA.
    • Biba, K.J. (1977), “Integrity considerations for secure computer systems”, Mitre Corp. Report No. MTR-3153, Mitre Corp., Bedford, MA, Bedford, MA.
    • (1977)
    • Biba, K.J.1
  • 4
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.E. (1976), “A lattice model of secure information flow”, Communications of the ACM, Vol. 19 No. 5, pp. 236-243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 6
    • 16244416439 scopus 로고    scopus 로고
    • Enhanced security services for S/MIME
    • Internet Engineering Task Force (IETF) rfc 2634.
    • Hoffman, P. (Ed.) (1999), “Enhanced security services for S/MIME”, Internet Engineering Task Force (IETF) rfc 2634.
    • (1999)
    • Hoffman, P.1
  • 7
    • 5344233941 scopus 로고
    • Security label framework for the internet
    • Internet Engineering Task Force (IETF) rfc 1457.
    • Housley, R. (1993), “Security label framework for the internet”, Internet Engineering Task Force (IETF) rfc 1457.
    • (1993)
    • Housley, R.1
  • 8
    • 7644221798 scopus 로고    scopus 로고
    • A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS
    • Huang, Q. and Shen, C. (2004), “A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS”, Proceedings of the 7th International Conference on Signal Processing (ICSP'04), Vol. 3, pp. 2409-12.
    • (2004) Proceedings of the 7th International Conference on Signal Processing (ICSP'04) , vol.3 , pp. 2409-2412
    • Huang, Q.1    Shen, C.2
  • 11
    • 0031611451 scopus 로고    scopus 로고
    • Role based access control on MLS systems without kernel changes
    • paper presented at 3rd ACM Workshop on Role-Based Access Control.
    • Kuhn, D.R. (1998), “Role based access control on MLS systems without kernel changes”, paper presented at 3rd ACM Workshop on Role-Based Access Control.
    • (1998)
    • Kuhn, D.R.1
  • 15
    • 60049092770 scopus 로고    scopus 로고
    • Microsoft
    • www.microsoft.com/ Microsoft available at
    • Microsoft (2008), “Microsoft”, available at: www.microsoft.com/.
    • (2008)
  • 16
    • 84992925210 scopus 로고
    • Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned
    • Neugent, B. (1994), “Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned”, Proceedings of the 10th Annual Computer Security Applications Conference, pp. 304-5.
    • (1994) Proceedings of the 10th Annual Computer Security Applications Conference , pp. 304-305
    • Neugent, B.1
  • 17
    • 67649640510 scopus 로고    scopus 로고
    • Glossary of key information security terms
    • NIST NIST IR 7298 National Institute of Standards and Technology Gaithersburg, MD
    • NIST (2006), “Glossary of key information security terms”, NIST IR 7298, National Institute of Standards and Technology, Gaithersburg, MD.
    • (2006)
  • 18
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborne, S., Sandhu, R. and Munawer, Q. (2000), “Configuring role-based access control to enforce mandatory and discretionary access control policies”, ACM Transactions on Information and System Security, Vol. 3 No. 2, pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborne, S.1    Sandhu, R.2    Munawer, Q.3
  • 19
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R.S. (1993), “Lattice-based access control models”, IEEE Computer, Vol. 26 No. 11, pp. 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 21
    • 0010381933 scopus 로고    scopus 로고
    • Internet security glossary
    • Internet Engineering Task Force (IETF) rfc 2828.
    • Shirey, R.W. (2000), “Internet security glossary”, Internet Engineering Task Force (IETF) rfc 2828.
    • (2000)
    • Shirey, R.W.1
  • 22
    • 51949095281 scopus 로고    scopus 로고
    • Sun Microsystems
    • www.sun.com/ Sun Microsystems available at
    • Sun Microsystems (2008), “Sun Microsystems”, available at: www.sun.com/.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.