-
1
-
-
85159680153
-
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In 1995 IEEE Symposium on Security and Privacy, pages 66-77, Oakland, CA, May 1995. URL:http://www.tis.com/docs/research/secure/securedteproj2.html.
-
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
0003400255
-
-
HQ Electronic Systems Division, Hanscom AFB, MA, April
-
K. J. Biba. Integrity Considerations for Secure Computer Sytems. Technical Report ESD-TR-76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
-
(1977)
Integrity Considerations for Secure Computer Sytems. Technical Report ESD-TR-76-372, the MITRE Corporation
-
-
Biba, K.J.1
-
4
-
-
85159684288
-
-
W. E. Boebert and R. Y. Kain. A practical alternative to hierarchical integrity policies. In 8th National Computer Security Conf., pages 18-27, Gaithersburg, MD, 1985. National Computer Security Center and National Bureau of Standards.
-
8Th National Computer Security Conf
-
-
Boebert, W.E.1
Kain, R.Y.2
-
5
-
-
0011321748
-
Vse: Controlling the complexity in formal software developments
-
D. Hutter, H. Mantel, G. Rock, W. Stephan, A. Wolpers, M. Balser, W. Reif, G. Schellhorn, and K. Stenzel. Vse: Controlling the complexity in formal software developments. In Applied Formal Methods - FM-Trends 98. LNCS 1641, 1998.
-
(1998)
Applied Formal Methods - Fm-Trends 98
, vol.1641
-
-
Hutter, D.1
Mantel, H.2
Rock, G.3
Stephan, W.4
Wolpers, A.5
Balser, M.6
Reif, W.7
Schellhorn, G.8
Stenzel, K.9
-
9
-
-
0011272226
-
-
RC 21717, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, 15 March
-
P. A. Karger, V. Austel, and D. Toll. A new mandatory security policy combining secrecy and integrity. RC 21717, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL:http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
(2000)
A new mandatory security policy combining secrecy and integrity
-
-
Karger, P.A.1
Austel, V.2
Toll, D.3
-
10
-
-
85159682730
-
-
P. A. Karger, V. Austel, and D. Toll. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In (EUROSMART) Security Conference, pages 134-148, Marseille, France, 13-15 June 2000. RC 21736 available at http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
-
-
Karger, P.A.1
Austel, V.2
Toll, D.3
-
11
-
-
85159666168
-
-
F. Koob, M. Ullmann, S. Wittmann, G. Schellhorn, W. Reif, A. Schairer, and W. Stephan. A generic security model for multiapplicative smart cards - final report of the SMaCOS project. to appear as BSI report.
-
-
-
Koob, F.1
Ullmann, M.2
Wittmann, S.3
Schellhorn, G.4
Reif, W.5
Schairer, A.6
Stephan, W.7
-
12
-
-
25944433853
-
Secure distributed data views
-
Technical Report SRI-CSL-88-8, SRI International, Menlo Park, CA, August
-
T. F. Lunt, P. G. Neumann, D. Denning, R. R. Schell, M. Heckman, and W. R. Shockley. Secure distributed data views - vol.1: Security policy and policy interpretation for a class A1 multilevel secure. Technical Report SRI-CSL-88-8, SRI International, Menlo Park, CA, August 1988.
-
(1988)
Security Policy and Policy Interpretation for a Class A1 Multilevel Secure
, vol.1
-
-
Lunt, T.F.1
Neumann, P.G.2
Denning, D.3
Schell, R.R.4
Heckman, M.5
Shockley, W.R.6
-
13
-
-
85159686725
-
-
J. McLean. Security models. In J. Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, 1994. URL:http://chacs.nrl.navy.mil/publications/CHACS.
-
-
-
Mc Lean, J.1
-
16
-
-
85159718934
-
-
J. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, Menlo Park, CA, 1992. URL:http://www.csl.sri.com/˜rushby/reports/csl-92-2.dvi.Z.
-
-
-
Rushby, J.1
-
17
-
-
85159652865
-
-
R. Schell, T. F. Tao, and M. Heckman. Desingning the GEMSOS security kernel for security and performance. In 8th National Computer Security Conference, pages 108–119, Gaithersburg, MD, 30 September - 3 October 1985. DoD Computer Security Center and National Bureau of Standards.
-
-
-
Schell, R.1
Tao, T.F.2
Heckman, M.3
-
18
-
-
85159701861
-
-
L. J. Shirley and R. R. Schell. Mechanism sufficiency validation by assignment. In 1981 Symposium on Security and Privacy, pages 26-32, Oakland, CA, 27-29 April 1981. IEEE Computer Society.
-
-
-
Shirley, L.J.1
Schell, R.R.2
-
19
-
-
85159686981
-
-
D. F. Sterne and G. S. Benson. The controlled application set paradigm for trusted systems. In 1995 National Information Systems Security Conference, Baltimore, Maryland, 1995. National Computer Security Center and National Institute of Standards and Technology. URL:http://www.tis.com/docs/research/secure/securedteproj2.html.
-
-
-
Sterne, D.F.1
Benson, G.S.2
|