-
1
-
-
84940117376
-
-
"Adage System Overview." http://www.memesoft.com/adage/docs/SystemSpec.ps
-
Adage System Overview
-
-
-
3
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large database
-
May
-
Baldwin, R. W. "Naming and Grouping Privileges to Simplify Security Management in Large Database" Proc. 1990 IEEE Symposium on Security and Privacy, 116-132, May 1990
-
(1990)
Proc 1990 IEEE Symposium on Security and Privacy
, pp. 116-132
-
-
Baldwin, R.W.1
-
5
-
-
0003400251
-
-
MTR-2997 Rev, MITRE Corp., Bedford, MA March
-
Bell, D.E., LaPadula, L.J. "Secure Computer Systems: Unified Exposition and Multics Interpretation" MTR-2997 Rev. 1, MITRE Corp., Bedford, MA, March 1976
-
(1976)
Computer Systems: Unified Exposition and Multics Interpretation
, vol.1
-
-
Bell, D.E.1
Secure J, L.L.2
-
16
-
-
84940117380
-
-
CORBAServices: Common Object Services Specification
-
CORBAServices: Common Object Services Specification. http://www.omg.org/corba/sectrans.htm
-
-
-
-
19
-
-
79952368890
-
Access controls for federated database environments
-
Graz, Austria
-
W. Emayr, F. Kastner, G. Pernul, S. Preishuber, and A.M. Tjoa, A M. "Access Controls for Federated Database Environments." Proc. Joint IFIP TC 6 and TC 11 Working Conf. on Communications and Multimedia Security, Graz, Austria. 1995. http://www.faw.uni-linz.ac.at/online/papers/95cms/paper.html
-
(1995)
Proc. Joint IFIP TC 6 and TC 11 Working Conf. on Communications and Multimedia Security
-
-
Emayr, W.1
Kastner, F.2
Pernul, G.3
Preishuber, S.4
Tjoa, A.M.5
-
25
-
-
0002263608
-
A new security policy for distributed resource management and access control
-
September
-
S.J.Greenwald. "A New Security Policy for Distributed Resource Management and Access Control." Proc. New Security Paradigms Workshop, September 1996
-
(1996)
Proc. New Security Paradigms Workshop
-
-
Greenwald, S.J.1
-
32
-
-
79958153716
-
Triggers and barriers to customizing software
-
W.E. Mackay. "Triggers and barriers to customizing software." Proc. CHI 91
-
Proc. CHI 91
-
-
Mackay, W.E.1
-
37
-
-
84940117386
-
-
HP Praesidium/Authorization Server White Paper
-
HP Praesidium/Authorization Server White Paper. http://www.hp.com/security/products/authorization-server/papers/whitepaper/
-
-
-
-
40
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J.H., and Schroeder, M.D. "The Protection of Information in Computer Systems, " Proceedings of IEEE, 63(9), 1278-1308, 1975
-
(1975)
Proceedings of IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
42
-
-
0030086382
-
Role-based access control models
-
February
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman. "Role-Based Access Control Models." IEEE Computer, Vol. 29, Num. 2, February 1996, pages 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
45
-
-
0007473204
-
An introduction to intrusion detection
-
April
-
A. Sundaram. "An Introduction to Intrusion Detection." ACM Crossroads, Vol. 2, No. 4, April 1996. http://www.acm.org/crossroads/xrds2-4/intrus.html
-
(1996)
ACM Crossroads
, vol.2
, Issue.4
-
-
Sundaram, A.1
-
46
-
-
63449132197
-
-
Carnegie-Mellon University Software Technology Review: Statistical-Based Intrusion Detection
-
Software Engineering Institute. Carnegie-Mellon University. "Software Technology Review: Statistical-Based Intrusion Detection." http://www.sei.cmu.edu/technology/str/descriptions/sbid.html
-
Software Engineering Institute
-
-
|