-
1
-
-
77949295272
-
-
Bell, D. E. and L. J. LaPadulat Secure Computer systems, ESDTR-73-278 (I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974.
-
Bell, D. E. and L. J. LaPadulat "Secure Computer systems," ESDTR-73-278 (Vol I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974.
-
-
-
-
2
-
-
0003400255
-
Integrity Considerations for Secure Computer systems
-
Mitre Corporation, Bedford, MA, April
-
Biba, K. J., "Integrity Considerations for Secure Computer systems," Mitre TR-3153, Mitre Corporation, Bedford, MA, April 1977.
-
(1977)
Mitre TR-3153
-
-
Biba, K.J.1
-
3
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
IEEE, April
-
David D. Clark, David R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," 1987 Symposium on Security and Privacy, pp. 184-194, IEEE, April 1987.
-
(1987)
1987 Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
4
-
-
0030680628
-
-
S. N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In 4th ACM Conf. on Computer and Communications Security, pp. 125-134. ACM Press, April 1997.
-
S. N. Foley. The specification and implementation of " commercial" security requirements including dynamic segregation of duties. In 4th ACM Conf. on Computer and Communications Security, pp. 125-134. ACM Press, April 1997.
-
-
-
-
5
-
-
35048864767
-
Secure databases: An analysis of Clark-Wilson model in a database environment
-
Persson A. and Stirna J, editors, 16th International Conference on Advanced Information Systems Engineering, CAiSE, of, Riga, Latvia, June
-
Xiaocheng Ge, Fiona Polack, and Regine Laleau. "Secure databases: an analysis of Clark-Wilson model in a database environment." In Persson A. and Stirna J., editors, 16th International Conference on Advanced Information Systems Engineering, CAiSE 2004, volume 3084 of Lecture Notes in Computer Science, pp. 234-247, Riga, Latvia, June 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3084
, pp. 234-247
-
-
Ge, X.1
Polack, F.2
Laleau, R.3
-
6
-
-
0023859517
-
Using mandatory integrity to enforce "commercial" security
-
Oakland, CA, PP
-
Lee T., "Using mandatory integrity to enforce "commercial" security". 1988 IEEE Symposium on Security and Privacy. Oakland, CA, PP. 140-146,1988.
-
(1988)
1988 IEEE Symposium on Security and Privacy
, pp. 140-146
-
-
Lee, T.1
-
7
-
-
6444224063
-
Implementing the Clark/Wilson integrity policy using current technology
-
Gaithersburg. MD, PP
-
Schockley W., "Implementing the Clark/Wilson integrity policy using current technology". In Proceedings of the 11th National Computer Security Conference, Gaithersburg. MD, PP.29-37, 1988.
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 29-37
-
-
Schockley, W.1
-
8
-
-
6444234162
-
An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model
-
Oct
-
LIANG Bin, SHI Wenchang, SUN Yufang and SUN Bo. "An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model". Chinese Journal of Electronics, Oct. 2004, Vol.13, No.4. 596-599.
-
(2004)
Chinese Journal of Electronics
, vol.13
, Issue.4
, pp. 596-599
-
-
LIANG, B.1
SHI, W.2
SUN, Y.3
Bo, S.U.N.4
-
9
-
-
41649120000
-
An Approach to Enforcing Clark-Wilson Model Based on Type Enforcement
-
Oct
-
HE Jian-bo, GUO Xin, QING Si-Han. "An Approach to Enforcing Clark-Wilson Model Based on Type Enforcement". Chinese Journal of Electronics, Oct. 2008, Vol.36, No.2. 216-223.
-
(2008)
Chinese Journal of Electronics
, vol.36
, Issue.2
, pp. 216-223
-
-
Jian-bo, H.E.1
Xin, G.U.O.2
Si-Han, Q.I.N.G.3
-
10
-
-
0030680628
-
The specification and implementation of commercial security requirements including dynamic segregation of duties
-
S.N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In ACM Conference on Computer and Communications Security, pp. 125-134, 1997.
-
(1997)
ACM Conference on Computer and Communications Security
, pp. 125-134
-
-
Foley, S.N.1
-
11
-
-
77949280858
-
-
Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments. OIML TC5/SC2/N7, 2006-1-27.
-
Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments. OIML TC5/SC2/N7, 2006-1-27.
-
-
-
-
12
-
-
21844468546
-
-
E. HAUBERT, el at, Tamper-resistant storage techniques for multimedia systems. In IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (SEI121) January 2005, pp. 30-40.E
-
E. HAUBERT, el at, Tamper-resistant storage techniques for multimedia systems. In IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (SEI121) January 2005, pp. 30-40.E
-
-
-
|