메뉴 건너뛰기




Volumn 68, Issue , 2007, Pages 25-32

Securing grid data using mandatory access controls

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SECURITY; GRID DATA; MANDATORY ACCESS CONTROL; SENSITIVE APPLICATION; TRUSTED COMPUTING BASE;

EID: 84871258169     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (3)

References (17)
  • 1
    • 0003400251 scopus 로고
    • Secure computing systems: unified exposition and MULTICS in- terpretation
    • Bedford, Massachusetts
    • Bell, D. & La-Padula, L. (1976), Secure computing systems: unified exposition and MULTICS in- terpretation, Technical Report ESD-TR-75-306, MITRE Corporation, Bedford, Massachusetts.
    • (1976) Technical Report ESD-TR-75-306, MITRE Corporation
    • Bell, D.1    La-Padula, L.2
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Hanscom Air Force Base, Bedford, Mas- sachusetts
    • Biba, K. J. (1977), Integrity considerations for secure computer systems, Technical Report MTR-35153, USAF Electronic Systems Divi- sion, Hanscom Air Force Base, Bedford, Mas- sachusetts.
    • (1977) Technical Report MTR-35153, USAF Electronic Systems Divi- sion
    • Biba, K.J.1
  • 3
    • 84867706682 scopus 로고    scopus 로고
    • Q.U.i.P.S a quality model for investigating risk exposure in e-health sys- tems
    • Croll, P. & Croll, J. (2004), 'Q.U.i.P.S a quality model for investigating risk exposure in e-health sys- tems', MedInfo Journal 2004 2004, 1023-1027.
    • (2004) MedInfo Journal 2004 2004 , pp. 1023-1027
    • Croll, P.1    Croll, J.2
  • 8
    • 84871236889 scopus 로고    scopus 로고
    • Intel
    • Available at
    • Intel (2003), 'LaGrande Technology Ar-chitectural Overview'. Available at http://www.intel.com/technology/security/downloads/LTArchOverview.pdf.
    • (2003) LaGrande Technology Ar-chitectural Overview
  • 10
    • 84871195973 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • Available at
    • National Institute of Standards and Technology (2003), 'Role based access control'. Available at http://csrc.nist.gov/rbac/rbac-std-ncits.pdf.
    • (2003) Role based access control
  • 11
    • 84871188902 scopus 로고    scopus 로고
    • National Security Agency
    • Available at
    • National Security Agency (2000), 'Security-Enhanced Linux homepage'. Available at http://www.nsa.gov/selinux/.
    • (2000) Security-Enhanced Linux homepage
  • 12
    • 63449110864 scopus 로고    scopus 로고
    • A novel use of RBAC to protect privacy in distributed health care information systems
    • R. Safavi-Naini & J. Seberry, eds, 'Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Springer
    • Reid, J., Cheong, I., Henricksen, M. & Smith, J. (2003), A novel use of RBAC to protect privacy in distributed health care information systems., in R. Safavi-Naini & J. Seberry, eds, 'Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings', Vol. 2727 of Lecture Notes in Computer Science, Springer, pp. 403-415.
    • (2003) Proceedings, of Lecture Notes in Computer Science , vol.2727 , pp. 403-415
    • Reid, J.1    Cheong, I.2    Henricksen, M.3    Smith, J.4
  • 13
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • Rindflesich, T. (1997), 'Privacy, information technology, and health care', Communications of the ACM 40(80), 93-100.
    • (1997) Communications of the ACM , vol.40 , Issue.80 , pp. 93-100
    • Rindflesich, T.1
  • 15
    • 84871244388 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Available at
    • Trusted Computing Group (2006), 'Trusted plat-form work group homepage'. Available at https://www.trustedcomputinggroup.org/groups/tpm/.
    • (2006) Trusted plat-form work group homepage


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.