-
1
-
-
0003400251
-
Secure computing systems: unified exposition and MULTICS in- terpretation
-
Bedford, Massachusetts
-
Bell, D. & La-Padula, L. (1976), Secure computing systems: unified exposition and MULTICS in- terpretation, Technical Report ESD-TR-75-306, MITRE Corporation, Bedford, Massachusetts.
-
(1976)
Technical Report ESD-TR-75-306, MITRE Corporation
-
-
Bell, D.1
La-Padula, L.2
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Hanscom Air Force Base, Bedford, Mas- sachusetts
-
Biba, K. J. (1977), Integrity considerations for secure computer systems, Technical Report MTR-35153, USAF Electronic Systems Divi- sion, Hanscom Air Force Base, Bedford, Mas- sachusetts.
-
(1977)
Technical Report MTR-35153, USAF Electronic Systems Divi- sion
-
-
Biba, K.J.1
-
3
-
-
84867706682
-
Q.U.i.P.S a quality model for investigating risk exposure in e-health sys- tems
-
Croll, P. & Croll, J. (2004), 'Q.U.i.P.S a quality model for investigating risk exposure in e-health sys- tems', MedInfo Journal 2004 2004, 1023-1027.
-
(2004)
MedInfo Journal 2004 2004
, pp. 1023-1027
-
-
Croll, P.1
Croll, J.2
-
7
-
-
84871207872
-
The concept of self-defending objects in the devel- opment of security aware applications
-
Adelaide, Australia
-
Holford, J., Caelli, W. & Rhodes, A. (2003), The concept of self-defending objects in the devel- opment of security aware applications, in 'Pro- ceedings of the Fourth Australian Information Warfare and IT Security Conference, Adelaide, Australia', pp. 159-169.
-
(2003)
Pro- ceedings of the Fourth Australian Information Warfare and IT Security Conference
, pp. 159-169
-
-
Holford, J.1
Caelli, W.2
Rhodes, A.3
-
8
-
-
84871236889
-
Intel
-
Available at
-
Intel (2003), 'LaGrande Technology Ar-chitectural Overview'. Available at http://www.intel.com/technology/security/downloads/LTArchOverview.pdf.
-
(2003)
LaGrande Technology Ar-chitectural Overview
-
-
-
9
-
-
0003262137
-
The inevitabil-ity of failure: The flawed assumption of security in modern computing environments
-
National Computer Security Center
-
Loscocco, P., Smalley, S., Muckelbaur, P., Taylor, R., Turner, J. & Farrell, J. (1998), The inevitabil-ity of failure: The flawed assumption of security in modern computing environments, in 'In Pro-ceedings of the 21st National Information Sys-tems Security Conference, National Computer Security Center', pp. 303-314.
-
(1998)
Pro-ceedings of the 21st National Information Sys-tems Security Conference
, pp. 303-314
-
-
Loscocco, P.1
Smalley, S.2
Muckelbaur, P.3
Taylor, R.4
Turner, J.5
Farrell, J.6
-
10
-
-
84871195973
-
National Institute of Standards and Technology
-
Available at
-
National Institute of Standards and Technology (2003), 'Role based access control'. Available at http://csrc.nist.gov/rbac/rbac-std-ncits.pdf.
-
(2003)
Role based access control
-
-
-
11
-
-
84871188902
-
National Security Agency
-
Available at
-
National Security Agency (2000), 'Security-Enhanced Linux homepage'. Available at http://www.nsa.gov/selinux/.
-
(2000)
Security-Enhanced Linux homepage
-
-
-
12
-
-
63449110864
-
A novel use of RBAC to protect privacy in distributed health care information systems
-
R. Safavi-Naini & J. Seberry, eds, 'Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Springer
-
Reid, J., Cheong, I., Henricksen, M. & Smith, J. (2003), A novel use of RBAC to protect privacy in distributed health care information systems., in R. Safavi-Naini & J. Seberry, eds, 'Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings', Vol. 2727 of Lecture Notes in Computer Science, Springer, pp. 403-415.
-
(2003)
Proceedings, of Lecture Notes in Computer Science
, vol.2727
, pp. 403-415
-
-
Reid, J.1
Cheong, I.2
Henricksen, M.3
Smith, J.4
-
13
-
-
0002779304
-
Privacy, information technology, and health care
-
Rindflesich, T. (1997), 'Privacy, information technology, and health care', Communications of the ACM 40(80), 93-100.
-
(1997)
Communications of the ACM
, vol.40
, Issue.80
, pp. 93-100
-
-
Rindflesich, T.1
-
15
-
-
84871244388
-
Trusted Computing Group
-
Available at
-
Trusted Computing Group (2006), 'Trusted plat-form work group homepage'. Available at https://www.trustedcomputinggroup.org/groups/tpm/.
-
(2006)
Trusted plat-form work group homepage
-
-
-
16
-
-
84871244028
-
Architecture for securing critical infras-tructures using context-aware self defending ob-jects
-
Vasanta, H., Holford, J., Caelli, W. & Looi, M. (2004), Architecture for securing critical infras-tructures using context-aware self defending ob-jects, in 'Proceedings of the Fifth Asia Pacific In-dustrial Engineering and Management Systems Conference'.
-
(2004)
Proceedings of the Fifth Asia Pacific In-dustrial Engineering and Management Systems Conference
-
-
Vasanta, H.1
Holford, J.2
Caelli, W.3
Looi, M.4
-
17
-
-
32344450199
-
Linux security mod-ule framework
-
Ottawa, Canada
-
Wright, C., Cowan, C., Morris, J., Smalley, S. & Kroah-Hartman, G. (2002), 'Linux security mod-ule framework'. Presented at the 2002 Ottawa Linux Symposium, Ottawa, Canada.
-
(2002)
Presented at the 2002 Ottawa Linux Symposium
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
|