메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 15-20

Configuring Clark-Wilson integrity model to enforce flexible protection

Author keywords

Anti tampering; Clark Wilson; Integrity; Security model; Software protection

Indexed keywords

CLARK-WILSON; COMMERCIAL INFORMATION; DATA ITEMS; DATA PROTECTION; INTEGRITY LEVELS; INTEGRITY PROTECTION; PC-BASED; SECURITY MODEL; SOFTWARE PROTECTION; UNAUTHORIZED MODIFICATION;

EID: 77949305252     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2009.249     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 77949295272 scopus 로고    scopus 로고
    • Bell, D. E. and L. J. LaPadulat Secure Computer systems, ESDTR-73-278 (I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974.
    • Bell, D. E. and L. J. LaPadulat "Secure Computer systems," ESDTR-73-278 (Vol I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974.
  • 2
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computer systems
    • Mitre Corporation, Bedford, MA, April
    • Biba, K. J., "Integrity Considerations for Secure Computer systems," Mitre TR-3153, Mitre Corporation, Bedford, MA, April 1977.
    • (1977) Mitre TR-3153
    • Biba, K.J.1
  • 3
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • IEEE, April
    • David D. Clark, David R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," 1987 Symposium on Security and Privacy, pp. 184-194, IEEE, April 1987.
    • (1987) 1987 Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 4
    • 0030680628 scopus 로고    scopus 로고
    • S. N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In 4th ACM Conf. on Computer and Communications Security, pp. 125-134. ACM Press, April 1997.
    • S. N. Foley. The specification and implementation of " commercial" security requirements including dynamic segregation of duties. In 4th ACM Conf. on Computer and Communications Security, pp. 125-134. ACM Press, April 1997.
  • 5
    • 35048864767 scopus 로고    scopus 로고
    • Secure databases: An analysis of Clark-Wilson model in a database environment
    • Persson A. and Stirna J, editors, 16th International Conference on Advanced Information Systems Engineering, CAiSE, of, Riga, Latvia, June
    • Xiaocheng Ge, Fiona Polack, and Regine Laleau. "Secure databases: an analysis of Clark-Wilson model in a database environment." In Persson A. and Stirna J., editors, 16th International Conference on Advanced Information Systems Engineering, CAiSE 2004, volume 3084 of Lecture Notes in Computer Science, pp. 234-247, Riga, Latvia, June 2004.
    • (2004) Lecture Notes in Computer Science , vol.3084 , pp. 234-247
    • Ge, X.1    Polack, F.2    Laleau, R.3
  • 6
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce "commercial" security
    • Oakland, CA, PP
    • Lee T., "Using mandatory integrity to enforce "commercial" security". 1988 IEEE Symposium on Security and Privacy. Oakland, CA, PP. 140-146,1988.
    • (1988) 1988 IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.1
  • 7
    • 6444224063 scopus 로고
    • Implementing the Clark/Wilson integrity policy using current technology
    • Gaithersburg. MD, PP
    • Schockley W., "Implementing the Clark/Wilson integrity policy using current technology". In Proceedings of the 11th National Computer Security Conference, Gaithersburg. MD, PP.29-37, 1988.
    • (1988) Proceedings of the 11th National Computer Security Conference , pp. 29-37
    • Schockley, W.1
  • 8
    • 6444234162 scopus 로고    scopus 로고
    • An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model
    • Oct
    • LIANG Bin, SHI Wenchang, SUN Yufang and SUN Bo. "An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model". Chinese Journal of Electronics, Oct. 2004, Vol.13, No.4. 596-599.
    • (2004) Chinese Journal of Electronics , vol.13 , Issue.4 , pp. 596-599
    • LIANG, B.1    SHI, W.2    SUN, Y.3    Bo, S.U.N.4
  • 9
    • 41649120000 scopus 로고    scopus 로고
    • An Approach to Enforcing Clark-Wilson Model Based on Type Enforcement
    • Oct
    • HE Jian-bo, GUO Xin, QING Si-Han. "An Approach to Enforcing Clark-Wilson Model Based on Type Enforcement". Chinese Journal of Electronics, Oct. 2008, Vol.36, No.2. 216-223.
    • (2008) Chinese Journal of Electronics , vol.36 , Issue.2 , pp. 216-223
    • Jian-bo, H.E.1    Xin, G.U.O.2    Si-Han, Q.I.N.G.3
  • 10
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of commercial security requirements including dynamic segregation of duties
    • S.N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In ACM Conference on Computer and Communications Security, pp. 125-134, 1997.
    • (1997) ACM Conference on Computer and Communications Security , pp. 125-134
    • Foley, S.N.1
  • 11
    • 77949280858 scopus 로고    scopus 로고
    • Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments. OIML TC5/SC2/N7, 2006-1-27.
    • Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments. OIML TC5/SC2/N7, 2006-1-27.
  • 12
    • 21844468546 scopus 로고    scopus 로고
    • E. HAUBERT, el at, Tamper-resistant storage techniques for multimedia systems. In IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (SEI121) January 2005, pp. 30-40.E
    • E. HAUBERT, el at, Tamper-resistant storage techniques for multimedia systems. In IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (SEI121) January 2005, pp. 30-40.E


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.