-
3
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Technical Report M74-244, MITRE Corp
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corp., 1975.
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report TR-3 153, MITRE Corp
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3 153, MITRE Corp., 1977.
-
(1977)
-
-
Biba, K.J.1
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE
-
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In CSFW'01: Computer Security Foundations Workshop, page 82. IEEE, 2001.
-
(2001)
CSFW'01: Computer Security Foundations Workshop
, pp. 82
-
-
Blanchet, B.1
-
7
-
-
70349270234
-
-
A. Chaudhuri, P. Naldurg, S. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. Technical Report MSR-TR-2008-21, Microsoft Research, 2008. See http: //www.soe.ucsc.edu/̃avik/projects/EON/.
-
A. Chaudhuri, P. Naldurg, S. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. Technical Report MSR-TR-2008-21, Microsoft Research, 2008. See http: //www.soe.ucsc.edu/̃avik/projects/EON/.
-
-
-
-
8
-
-
77954397557
-
Analysis of the windows vista security model
-
Available at
-
M. Conover. Analysis of the windows vista security model. Symantec Report. Available at www.symantec.com/avcenter/reference/Windows-Vista-Security- Model-Analysis.pdf.
-
Symantec Report
-
-
Conover, M.1
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
11
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Maziéres, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In SOSP '05: Symposium on Operating Systems Principles, pages 17-30. ACM, 2005.
-
(2005)
SOSP '05: Symposium on Operating Systems Principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Maziéres, D.7
Kaashoek, F.8
Morris, R.9
-
12
-
-
0345242253
-
Static analysis in datalog extensions
-
A. Y. Halevy, I. S. Mumick, Y. Sagiv, and O. Shmueli. Static analysis in datalog extensions. Journal of the ACM, 48(5):971-1012, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.5
, pp. 971-1012
-
-
Halevy, A.Y.1
Mumick, I.S.2
Sagiv, Y.3
Shmueli, O.4
-
15
-
-
2942630487
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Technical report, NSA, 1995
-
P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. Technical report, NSA, 1995.
-
-
-
Loscocco, P.1
Smalley, S.2
Muckelbauer, P.3
Taylor, R.4
Turner, J.5
Farrell, J.6
-
16
-
-
34547327908
-
Netra: Seeing through access control
-
ACM
-
P. Naldurg, S. Schwoon, S. Rajamani, and J. Lambert. Netra: seeing through access control. In FMSE'06: Formal Methods in Security Engineering, pages 55-66. ACM, 2006.
-
(2006)
FMSE'06: Formal Methods in Security Engineering
, pp. 55-66
-
-
Naldurg, P.1
Schwoon, S.2
Rajamani, S.3
Lambert, J.4
-
17
-
-
0030147450
-
On temporal deductive databases
-
M. A. Orgun. On temporal deductive databases. Computational Intelligence, 12:235-259, 1996.
-
(1996)
Computational Intelligence
, vol.12
, pp. 235-259
-
-
Orgun, M.A.1
-
20
-
-
85040876695
-
-
J. D. Ullman. Principles of Database and Knowledge-base Systems, II: The New Technologies. Computer Science Press, New York, 1989.
-
J. D. Ullman. Principles of Database and Knowledge-base Systems, Volume II: The New Technologies. Computer Science Press, New York, 1989.
-
-
-
|