메뉴 건너뛰기




Volumn 23, Issue , 2006, Pages 93-105

Multilevel security and quality of protection

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84880274363     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-36584-8_8     Document Type: Article
Times cited : (13)

References (38)
  • 2
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.: A lattice model of secure information flow. Communications of the ACM 19(5) (1976) 236-243
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 4
    • 84974747910 scopus 로고
    • Aggregation and separation as noninterference properties
    • Foley, S.: Aggregation and separation as noninterference properties. Journal of Computer Security 1(2)(1992) 159-188
    • (1992) Journal of Computer Security , vol.1 , Issue.2 , pp. 159-188
    • Foley, S.1
  • 5
    • 0027699087 scopus 로고
    • Lattice based access control models
    • Sandhu, R.: Lattice based access control models. IEEE Computer 26(11) (1993) 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 7
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of commercial security requirements including dynamic segregation of duties
    • In
    • Foley, S.: The specification and implementation of commercial security requirements including dynamic segregation of duties. In: ACM Conference on Computer and Communications Security. (1997) 125-134
    • (1997) ACM Conference on Computer and Communications Security , pp. 125-134
    • Foley, S.1
  • 11
    • 21644486232 scopus 로고    scopus 로고
    • If A 1 is the answer, what was the question? an edgy naif's retrospective on promulgating the trusted computer systems evaluation criteria
    • In:, IEEE Press
    • Schaefer, M.: If A 1 is the answer, what was the question? an edgy naif's retrospective on promulgating the trusted computer systems evaluation criteria. In: Annual Computer Security Applications Conference, IEEE Press (2004) 204-228
    • (2004) Annual Computer Security Applications Conference , pp. 204-228
    • Schaefer, M.1
  • 12
    • 0032641890 scopus 로고    scopus 로고
    • 20 years of covert channel modeling and analysis
    • In
    • Millen, J.: 20 years of covert channel modeling and analysis. In: IEEE Symposium on Security and Privacy. (1999) 113-114
    • (1999) IEEE Symposium on Security and Privacy , pp. 113-114
    • Millen, J.1
  • 17
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security 3(1) (1995) 5-33
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 23
    • 0031337155 scopus 로고    scopus 로고
    • Securing an object relational database
    • In:, IEEE Computer Society
    • Lewis, S., Wiseman, S.: Securing an object relational database. In: ACSAC, IEEE Computer Society (1997) 59-68
    • (1997) ACSAC , pp. 59-68
    • Lewis, S.1    Wiseman, S.2
  • 26
    • 84882712406 scopus 로고
    • A model for secure information flow
    • In:, Oakland, CA, IEEE Computer Society Press
    • Foley, S.: A model for secure information flow. In: Proceedings of the Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press (1989)
    • (1989) Proceedings of the Symposium on Security and Privacy
    • Foley, S.1
  • 31
    • 0001737878 scopus 로고    scopus 로고
    • Practical applications of constraint programming
    • Wallace, M.: Practical applications of constraint programming. Constraints 1(1-2) (1996) 139-168
    • (1996) Constraints , vol.1 , Issue.1-2 , pp. 139-168
    • Wallace, M.1
  • 34
    • 84882608073 scopus 로고
    • U.S. Department of Defense, Technical Report CSCSTD-001-83, U.S. National Computer Security Center
    • U. S. Department of Defense: Trusted computer system criteria. Technical Report CSCSTD-001-83, U. S. National Computer Security Center (1983)
    • (1983) Trusted computer system criteria
  • 35
    • 84974751467 scopus 로고
    • The cascade vulnerability problem
    • Horton, R., et al.: The cascade vulnerability problem. Journal of Computer Security 2(4) (1993) 279-290
    • (1993) Journal of Computer Security , vol.2 , Issue.4 , pp. 279-290
    • Horton, R.1
  • 36
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. JACM 44(2) (I 997) 201-236
    • (1997) JACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 38
    • 0027559721 scopus 로고
    • A shortest path network security model
    • Fitch, J., Hoffman, L.: A shortest path network security model. Computers and Security 12 (1993) 169-189
    • (1993) Computers and Security , vol.12 , pp. 169-189
    • Fitch, J.1    Hoffman, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.