-
3
-
-
0003969635
-
Department of defense trusted computer system evaluation criteria
-
National Computer Security Center NCSC, Fort Meade, Maryland
-
National Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria. Technical report, US National Computer Security Center, NCSC, Fort Meade, Maryland, 1985.
-
(1985)
Technical Report, US National Computer Security Center
-
-
-
4
-
-
85084164023
-
A comparison of methods for implementing adaptive security poli cies
-
San Antonio, TX, January USENIX Association
-
Michael Carney and Brian Loe. A comparison of methods for implementing adaptive security poli cies. In Seventh USENIX Security Symposium Proceedings, pages 1-14, San Antonio, TX, January 1998. USENIX Association.
-
(1998)
Seventh USENIX Security Symposium Proceedings
, pp. 1-14
-
-
Carney, M.1
Loe, B.2
-
5
-
-
84863929892
-
-
Secure Computing Corporation Technical report
-
Secure Computing Corporation. DTOS Composability Study. Technical report, 1997. http://www.securecomputing.com/randt/HTML/technical-docs.html.
-
(1997)
DTOS Composability Study
-
-
-
6
-
-
0024877148
-
Noninterference and unwinding for LOCK
-
Todd Fine, Thomas Haigh, Richard O'Brien, and Dana Toups. Noninterference and Unwinding for LOCK. In Proceedings of Computer Security Foundations Workshop II, pages 22-28, Franconia, NH, Jun 1989. IEEE. (Pubitemid 20616546)
-
(1989)
Proc Comput Secur Found Workshop II
, pp. 22-28
-
-
Fine Todd1
Haigh J.Thomas2
O'Brien Richard, C.3
Toups Dana, L.4
-
7
-
-
0025103204
-
Constructively using noninterference to analyze systems
-
1990 IEEE Comput Soc Symp Res Secur Privacy
-
Todd Fine. Constructively Using Noninterference to Analyze Systems. In IEEE Symposium on Security and Privacy, pages 162-169, Oakland, CA, May 1990. (Pubitemid 20739284)
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 162-169
-
-
Fine Todd1
-
11
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
Oakland, CA, May
-
John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1994.
-
(1994)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McLean, J.1
-
12
-
-
85084163247
-
Providing policy control over object operations in a mach based system
-
Salt Lake City, UT, June USENIX Association
-
Spencer E. Minear. Providing policy control over object operations in a mach based system. In Fifth USENIX Security Symposium Proceedings, pages 141-156, Salt Lake City, UT, June 1995. USENIX Association.
-
(1995)
Fifth USENIX Security Symposium Proceedings
, pp. 141-156
-
-
Minear, S.E.1
-
13
-
-
0003524744
-
The PVS specification language (Beta release)
-
SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June
-
Owre, Shankar and Rushby. The PVS Specification Language (Beta Release). User Manual, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June 1993. http://www.csl.sri.com/reports/ pvs-language.dvi,ps.Z.
-
(1993)
User Manual
-
-
Owre, S.1
Rushby2
-
14
-
-
84863894510
-
A tutorial introduction to PVS
-
SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June
-
Owre, Shankar, Rushby, Crow and Srivas. A Tutorial Introduction to PVS. User Manual, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June 1995. http://www.csl.sri.com/sri-csl-fm. html.
-
(1995)
User Manual
-
-
Owre, S.1
Rushby, C.2
-
15
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
333 Ravenswood Avenue, Menlo Park, CA 94025-3493, December
-
John Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, December 1992. http://www.csl.sri.com/csl-92-2.html.
-
(1992)
Technical Report CSL-92-02, SRI International Computer Science Laboratory
-
-
Rushby, J.1
-
17
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi Sandhu, Edward Coyne, Hal Feinstein, and Charles Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
|