메뉴 건너뛰기




Volumn 1485, Issue , 1998, Pages 51-66

Dealing with multi-policy security in large open distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84958752778     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055855     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 1
    • 0002995255 scopus 로고
    • Composing Specification
    • Digital Systems Research Center, Oct
    • M. Abadi and L. Lamport. Composing Specification. Technical Report 66, Digital Systems Research Center, Oct. 1990.
    • (1990) Technical Report 66
    • Abadi, M.1    Lamport, L.2
  • 4
    • 0003400251 scopus 로고
    • Secure Computer Systems: Unified Exposition and Multics Interpretation
    • MITRE Corporation, Bedford, Mass
    • D. E. Bell and L. J. LaPadula. Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997 Rev. 1, MITRE Corporation, Bedford, Mass, 1976.
    • (1976) Technical Report MTR-2997 Rev. 1
    • Bell, D.E.1    Lapadula, L.J.2
  • 8
    • 84974754345 scopus 로고
    • A logical view of secure dependencies
    • P. Bieber and F. Cuppens. A logical view of secure dependencies. Journal of Computer Security, 1(1):99-129, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-129
    • Bieber, P.1    Cuppens, F.2
  • 11
    • 0003969633 scopus 로고
    • Trusted Computer System Evaluation Criteria
    • Department of Defense Standard. Trusted Computer System Evaluation Criteria. Technical Report DoD 5200.28-STD, Dec. 1985.
    • (1985) Technical Report Dod 5200.28-STD
  • 14
  • 15
    • 84958816763 scopus 로고
    • White Paper on Security
    • OMG, Apr
    • OMG Security Working Group. White Paper on Security. TC Document 94.4.16, OMG, Apr. 1994. Available by ftp at ftp.omg.org:/pub/docs.
    • (1994) TC Document 94.4.16
  • 18
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, Nov. 1981.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 21
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of possibilistic properties
    • Jan
    • J. McLean. A general theory of composition for a class of possibilistic properties. IEEE Transactions on Software Engineering, 22(1):53-67, Jan. 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 22
    • 0025512697 scopus 로고
    • Specifying Discretionary Access Control Policy for Distributed Systems
    • Nov
    • J. D. Moffett, M. D. Sloman, and K. Twidle. Specifying Discretionary Access Control Policy for Distributed Systems. Computer Communications, 13(9):571-580, Nov. 1990.
    • (1990) Computer Communications , vol.13 , Issue.9 , pp. 571-580
    • Moffett, J.D.1    Sloman, M.D.2    Twidle, K.3
  • 23
    • 84957073062 scopus 로고
    • Trusted Network Interpretation of the TCSEC
    • July
    • National Computer Security Center. Trusted Network Interpretation of the TCSEC. Technical Report NCSC-TG-005, July 1987.
    • (1987) Technical Report NCSC-TG-005
  • 24
    • 0003481211 scopus 로고
    • The Common Object Request Broker: Architecture and Specification - Revision 2.0
    • OMG. The Common Object Request Broker: Architecture and Specification - Revision 2.0. Technical report, OMG Document, 1995.
    • (1995) Technical Report, OMG Document
  • 26
    • 84969339470 scopus 로고
    • TINA Object Definition Language (TINA-ODL) Manual - Version 1.3
    • TINA-C. TINA Object Definition Language (TINA-ODL) Manual - Version 1.3. Technical Report TR_NM.002_l.3_95, TINA-C Document, 1995.
    • (1995) Technical Report Tr_Nm.002_L.3_95, TINA-C Document


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.