메뉴 건너뛰기




Volumn 5429 LNCS, Issue , 2009, Pages 32-36

Idea: Trusted emergency management

Author keywords

[No Author keywords available]

Indexed keywords

EMERGENCY INFORMATION; EMERGENCY MANAGEMENT; EMERGENCY STATE; END USERS; SECURE DATA STORAGE; SENSITIVE INFORMATIONS;

EID: 70350647493     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00199-4_3     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 2
    • 70350673636 scopus 로고    scopus 로고
    • Trusted emergency management
    • Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA Naval Postgraduate School
    • Levin, T.E., Irvine, C.E., Benzel, T.V., Nguyen, T.D., Clark, P.C., Bhaskara, G.: Trusted emergency management. Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA (Naval Postgraduate School)
    • Levin, T.E.1    Irvine, C.E.2    Benzel, T.V.3    Nguyen, T.D.4    Clark, P.C.5    Bhaskara, G.6
  • 3
    • 0025022888 scopus 로고
    • Beyond the pale of MAC and DAC: Defining new forms of access control
    • Oakland, CA, pp, IEEE Computer Society, Los Alamitos
    • McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the pale of MAC and DAC: defining new forms of access control. In: Proc. of Symposium on Security and Privacy, Oakland, CA, pp. 190-200. IEEE Computer Society, Los Alamitos (1990)
    • (1990) Proc. of Symposium on Security and Privacy , pp. 190-200
    • McCollum, C.J.1    Messing, J.R.2    Notargiacomo, L.3
  • 4
    • 70350660377 scopus 로고
    • Immediacy in distributed trusted systems
    • New Orleans, Louisiana. IEEE Computer Societ, Los Alamitos
    • Grossman, G.: Immediacy in distributed trusted systems. In: Proc. of Annual Computer Security Applications Conference, New Orleans, Louisiana. IEEE Computer Societ, Los Alamitos (1995)
    • (1995) Proc. of Annual Computer Security Applications Conference
    • Grossman, G.1
  • 5
    • 70350691570 scopus 로고    scopus 로고
    • Securecore security architecture: Authority mode and emergency management
    • Technical Report NPS-CS-07-012 and ISI-TR-647, Naval Postgraduate School and USC Information Science Institute, Monterey, CA October
    • Levin, T., Bhaskara, G., Nguyen, T.D., Clark, P.C., Benzel, T.V., Irvine, C.E.: Securecore security architecture: Authority mode and emergency management. Technical Report NPS-CS-07-012 and ISI-TR-647, Naval Postgraduate School and USC Information Science Institute, Monterey, CA (October 2007)
    • (2007)
    • Levin, T.1    Bhaskara, G.2    Nguyen, T.D.3    Clark, P.C.4    Benzel, T.V.5    Irvine, C.E.6
  • 6
    • 70350693704 scopus 로고    scopus 로고
    • NSA: U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Version 1.03. National Security Agency June 2007
    • NSA: U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Version 1.03. National Security Agency (June 2007)
  • 8
    • 70350643158 scopus 로고    scopus 로고
    • Securecore software architecture: Trusted path application (TPA) requirements
    • Technical Report NPS-CS-07-001, Naval Postgraduate School, Monterey, CA December
    • Clark, P.C., Irvine, C.E., Levin, T.E., Nguyen, T.D., Vidas, T.M.: Securecore software architecture: Trusted path application (TPA) requirements. Technical Report NPS-CS-07-001, Naval Postgraduate School, Monterey, CA (December 2007)
    • (2007)
    • Clark, P.C.1    Irvine, C.E.2    Levin, T.E.3    Nguyen, T.D.4    Vidas, T.M.5
  • 9
    • 42549167254 scopus 로고    scopus 로고
    • Hardware-rooted trust for secure key management and transient trust
    • Alexandria, Virginia, USA, pp, ACM, New York
    • Dwoskin, J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proc. of 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, pp. 389-400. ACM, New York (2007)
    • (2007) Proc. of 14th ACM conference on Computer and communications security , pp. 389-400
    • Dwoskin, J.S.1    Lee, R.B.2
  • 10
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview
    • TCG:, Technical Report 1.2, Trusted Computing Group April
    • TCG: TCG specification architecture overview. Technical Report 1.2, Trusted Computing Group (April 2004)
    • (2004)
  • 11
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31, 831-860 (1999)
    • (1999) Computer Networks , vol.31 , pp. 831-860
    • Smith, S.1    Weingart, S.2
  • 12
    • 0029697680 scopus 로고    scopus 로고
    • A security policy model for clinical information systems
    • Oakland, CA, May
    • Anderson, R.J.: A security policy model for clinical information systems. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 30-43 (1996)
    • (1996) IEEE Symposium on Security and Privacy , pp. 30-43
    • Anderson, R.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.