-
1
-
-
0003400251
-
Secure computer systems, mathematical foundations
-
Mitre Corp. Report No. MTR-2547 Mitre Corp. Bedford, MA
-
Bell, D.E. and LaPadula, L.J. (1975), “Secure computer systems, mathematical foundations”, Mitre Corp. Report No. MTR-2547, Mitre Corp., Bedford, MA.
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Mitre Corp. Report No. MTR-3153 Mitre Corp. Bedford, MA, Bedford, MA.
-
Biba, K.J. (1977), “Integrity considerations for secure computer systems”, Mitre Corp. Report No. MTR-3153, Mitre Corp., Bedford, MA, Bedford, MA.
-
(1977)
-
-
Biba, K.J.1
-
4
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.E. (1976), “A lattice model of secure information flow”, Communications of the ACM, Vol. 19 No. 5, pp. 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
6
-
-
16244416439
-
Enhanced security services for S/MIME
-
Internet Engineering Task Force (IETF) rfc 2634.
-
Hoffman, P. (Ed.) (1999), “Enhanced security services for S/MIME”, Internet Engineering Task Force (IETF) rfc 2634.
-
(1999)
-
-
Hoffman, P.1
-
7
-
-
5344233941
-
Security label framework for the internet
-
Internet Engineering Task Force (IETF) rfc 1457.
-
Housley, R. (1993), “Security label framework for the internet”, Internet Engineering Task Force (IETF) rfc 1457.
-
(1993)
-
-
Housley, R.1
-
8
-
-
7644221798
-
A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS
-
Huang, Q. and Shen, C. (2004), “A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS”, Proceedings of the 7th International Conference on Signal Processing (ICSP'04), Vol. 3, pp. 2409-12.
-
(2004)
Proceedings of the 7th International Conference on Signal Processing (ICSP'04)
, vol.3
, pp. 2409-2412
-
-
Huang, Q.1
Shen, C.2
-
9
-
-
20144389120
-
Overview of a high assurance architecture for distributed multilevel security
-
Irvine, C.E., Levin, T.E., Nguyen, T.D., Shifflett, D., Khosalim, J., Clark, P.C., Wong, A., Afinidad, F., Bibighaus, D. and Sears, J. (2004), “Overview of a high assurance architecture for distributed multilevel security”, Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, pp. 38-45.
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance and Security
, pp. 38-45
-
-
Irvine, C.E.1
Levin, T.E.2
Nguyen, T.D.3
Shifflett, D.4
Khosalim, J.5
Clark, P.C.6
Wong, A.7
Afinidad, F.8
Bibighaus, D.9
Sears, J.10
-
10
-
-
34648871901
-
Extended BLP security model based on process reliability for secure Linux kernel
-
Kang, J-M., Shin, W., Park, C-G. and Lee, D-I. (2001), “Extended BLP security model based on process reliability for secure Linux kernel”, Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing, IEEE Computer Society, pp. 299-303.
-
(2001)
Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing, IEEE Computer Society
, pp. 299-303
-
-
Kang, J.-M.1
Shin, W.2
Park, C.-G.3
Lee, D.-I.4
-
11
-
-
0031611451
-
Role based access control on MLS systems without kernel changes
-
paper presented at 3rd ACM Workshop on Role-Based Access Control.
-
Kuhn, D.R. (1998), “Role based access control on MLS systems without kernel changes”, paper presented at 3rd ACM Workshop on Role-Based Access Control.
-
(1998)
-
-
Kuhn, D.R.1
-
12
-
-
84976780900
-
A security model for military message systems
-
Landwehr, C.E., Heitmeyer, C.L. and McLean, J.D. (1984), “A security model for military message systems”, ACM Transactions on Computer Systems, Vol. 2 No. 3, pp. 198-222.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.3
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.D.3
-
15
-
-
60049092770
-
Microsoft
-
www.microsoft.com/ Microsoft available at
-
Microsoft (2008), “Microsoft”, available at: www.microsoft.com/.
-
(2008)
-
-
-
16
-
-
84992925210
-
Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned
-
Neugent, B. (1994), “Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned”, Proceedings of the 10th Annual Computer Security Applications Conference, pp. 304-5.
-
(1994)
Proceedings of the 10th Annual Computer Security Applications Conference
, pp. 304-305
-
-
Neugent, B.1
-
17
-
-
67649640510
-
Glossary of key information security terms
-
NIST NIST IR 7298 National Institute of Standards and Technology Gaithersburg, MD
-
NIST (2006), “Glossary of key information security terms”, NIST IR 7298, National Institute of Standards and Technology, Gaithersburg, MD.
-
(2006)
-
-
-
18
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborne, S., Sandhu, R. and Munawer, Q. (2000), “Configuring role-based access control to enforce mandatory and discretionary access control policies”, ACM Transactions on Information and System Security, Vol. 3 No. 2, pp. 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborne, S.1
Sandhu, R.2
Munawer, Q.3
-
19
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R.S. (1993), “Lattice-based access control models”, IEEE Computer, Vol. 26 No. 11, pp. 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
20
-
-
0033652039
-
The NIST model for role-based access control: towards a unified standard
-
Sandhu, R.S., Ferraiolo, D., Gavrila, S., Hu, V. and Kuhn, R. (2000), “The NIST model for role-based access control: towards a unified standard”, Proceedings of the 5th ACM Workshop on Role Based Access Control.
-
(2000)
Proceedings of the 5th ACM Workshop on Role Based Access Control
-
-
Sandhu, R.S.1
Ferraiolo, D.2
Gavrila, S.3
Hu, V.4
Kuhn, R.5
-
21
-
-
0010381933
-
Internet security glossary
-
Internet Engineering Task Force (IETF) rfc 2828.
-
Shirey, R.W. (2000), “Internet security glossary”, Internet Engineering Task Force (IETF) rfc 2828.
-
(2000)
-
-
Shirey, R.W.1
-
22
-
-
51949095281
-
Sun Microsystems
-
www.sun.com/ Sun Microsystems available at
-
Sun Microsystems (2008), “Sun Microsystems”, available at: www.sun.com/.
-
(2008)
-
-
|