-
4
-
-
0003400251
-
-
Technical Report M74-244, MITRE Corporation, Bedford, MA, USA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corporation, Bedford, MA, USA, 1975.
-
(1975)
Secure computer systems: Mathematical foundations and model
-
-
Bell, D.E.1
LaPadula, L.J.2
-
5
-
-
0003400255
-
-
Technical Report TR-3153, MITRE Corporation, Bedford, Massachusetts, USA
-
K. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, MITRE Corporation, Bedford, Massachusetts, USA, 1977.
-
(1977)
Integrity considerations for secure computer systems
-
-
Biba, K.1
-
7
-
-
0043219365
-
-
QED Technical Publishing Group, Wellesley, MA, USA, second edition
-
E. R. Buck. Introduction to Data Security and Controls. QED Technical Publishing Group, Wellesley, MA, USA, second edition, 1991.
-
(1991)
Introduction to Data Security and Controls
-
-
Buck, E.R.1
-
10
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
11
-
-
0003508568
-
-
Federal Information Processing Standards Publications (FIPS PUB) 46, National Bureau of Standards, Jan
-
Federal Information Processing Standards Publications (FIPS PUB) 46. Data Encryption Standard. National Bureau of Standards, Jan. 1977.
-
(1977)
Data Encryption Standard
-
-
-
12
-
-
0008464478
-
Comprehensive information technology security: A new approach to respond ethical and social issues surrounding information security in the 21st century
-
Cape Town, South Africa, May
-
A. Hartmann. Comprehensive information technology security: A new approach to respond ethical and social issues surrounding information security in the 21st century. In Proceedings of the IFIP TC11 11th international conference of Information Security, Cape Town, South Africa, May 1995.
-
(1995)
Proceedings of the IFIP TC11 11th international conference of Information Security
-
-
Hartmann, A.1
-
14
-
-
85013585900
-
Foreword for republishing of the Bell-LaPadula model
-
L. J. LaPadula. Foreword for republishing of the Bell-LaPadula model. Journal of Computer Security, 4:233-238, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 233-238
-
-
LaPadula, L.J.1
-
18
-
-
0347577437
-
-
John Wiley & Sons
-
S. Muftic, A. Patel, P. Sanders, R. Colon, J. Heijnsdijk, and U. Pulkkinen. Security Architecture for Open Distributed Systems. John Wiley & Sons, 1994.
-
(1994)
Security Architecture for Open Distributed Systems
-
-
Muftic, S.1
Patel, A.2
Sanders, P.3
Colon, R.4
Heijnsdijk, J.5
Pulkkinen, U.6
-
19
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21 (2):120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
0027699087
-
Lattice-based access control models
-
Nov
-
R. S. Sandhu. Lattice-based access control models. IEEE Computer, pages 9-19, Nov. 1993.
-
(1993)
IEEE Computer
, pp. 9-19
-
-
Sandhu, R.S.1
-
21
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. S. Sandhu, E. J. Coyne, H. J. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.J.3
Youman, C.E.4
-
22
-
-
0003855464
-
-
John Wiley & Sons, New York, second edition
-
B. Schneier. Applied Cryptography. John Wiley & Sons, New York, second edition, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
23
-
-
0003902428
-
-
Prentice Hall, Inc., Englewood Cliffs, NJ, USA
-
W. Stallings. Network and Internetwork Security: Principles and Practise. Prentice Hall, Inc., Englewood Cliffs, NJ, USA, 1995.
-
(1995)
Network and Internetwork Security: Principles and Practise
-
-
Stallings, W.1
-
26
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≤ cost (signature) + cost(encryption)
-
number 1294 in Lecture Notes in Computer Science. Springer-Verlag
-
Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) ≤ cost (signature) + cost(encryption). In Advances in Cryptology-Crypto'97, number 1294 in Lecture Notes in Computer Science. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology-Crypto'97
-
-
Zheng, Y.1
|