메뉴 건너뛰기




Volumn 1895, Issue , 2000, Pages 17-36

Verification of a formal security model for multiapplicative smart cards

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 84944051800     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722599_2     Document Type: Conference Paper
Times cited : (42)

References (19)
  • 1
    • 85159680153 scopus 로고    scopus 로고
    • L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In 1995 IEEE Symposium on Security and Privacy, pages 66-77, Oakland, CA, May 1995. URL:http://www.tis.com/docs/research/secure/securedteproj2.html.
    • Badger, L.1    Sterne, D.F.2    Sherman, D.L.3    Walker, K.M.4    Haghighat, S.A.5
  • 4
    • 85159684288 scopus 로고    scopus 로고
    • W. E. Boebert and R. Y. Kain. A practical alternative to hierarchical integrity policies. In 8th National Computer Security Conf., pages 18-27, Gaithersburg, MD, 1985. National Computer Security Center and National Bureau of Standards.
    • 8Th National Computer Security Conf
    • Boebert, W.E.1    Kain, R.Y.2
  • 9
    • 0011272226 scopus 로고    scopus 로고
    • RC 21717, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, 15 March
    • P. A. Karger, V. Austel, and D. Toll. A new mandatory security policy combining secrecy and integrity. RC 21717, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL:http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • (2000) A new mandatory security policy combining secrecy and integrity
    • Karger, P.A.1    Austel, V.2    Toll, D.3
  • 10
    • 85159682730 scopus 로고    scopus 로고
    • P. A. Karger, V. Austel, and D. Toll. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In (EUROSMART) Security Conference, pages 134-148, Marseille, France, 13-15 June 2000. RC 21736 available at http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • Karger, P.A.1    Austel, V.2    Toll, D.3
  • 13
    • 85159686725 scopus 로고    scopus 로고
    • J. McLean. Security models. In J. Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, 1994. URL:http://chacs.nrl.navy.mil/publications/CHACS.
    • Mc Lean, J.1
  • 16
    • 85159718934 scopus 로고    scopus 로고
    • J. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, Menlo Park, CA, 1992. URL:http://www.csl.sri.com/˜rushby/reports/csl-92-2.dvi.Z.
    • Rushby, J.1
  • 17
    • 85159652865 scopus 로고    scopus 로고
    • R. Schell, T. F. Tao, and M. Heckman. Desingning the GEMSOS security kernel for security and performance. In 8th National Computer Security Conference, pages 108–119, Gaithersburg, MD, 30 September - 3 October 1985. DoD Computer Security Center and National Bureau of Standards.
    • Schell, R.1    Tao, T.F.2    Heckman, M.3
  • 18
    • 85159701861 scopus 로고    scopus 로고
    • L. J. Shirley and R. R. Schell. Mechanism sufficiency validation by assignment. In 1981 Symposium on Security and Privacy, pages 26-32, Oakland, CA, 27-29 April 1981. IEEE Computer Society.
    • Shirley, L.J.1    Schell, R.R.2
  • 19
    • 85159686981 scopus 로고    scopus 로고
    • D. F. Sterne and G. S. Benson. The controlled application set paradigm for trusted systems. In 1995 National Information Systems Security Conference, Baltimore, Maryland, 1995. National Computer Security Center and National Institute of Standards and Technology. URL:http://www.tis.com/docs/research/secure/securedteproj2.html.
    • Sterne, D.F.1    Benson, G.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.