메뉴 건너뛰기




Volumn Part F129230, Issue , 1998, Pages 107-118

Discussion topic: What is the old security paradigm?

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84964526045     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/310889.310925     Document Type: Conference Paper
Times cited : (18)

References (38)
  • 1
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Deputy for Command and Management Systems HQ Electronic Division (AFSC), L. G. Hanscom Field, Bedford, Massachussetts O1730, October Available from the National Technical Information Service as report number AD-758-206
    • J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Vol. II, Deputy for Command and Management Systems HQ Electronic Division (AFSC), L. G. Hanscom Field, Bedford, Massachussetts O1730, October 1972. Available from the National Technical Information Service as report number AD-758-206.
    • (1972) Technical Report ESD-TR-73-51 , vol.2
    • Anderson, J.P.1
  • 2
    • 61849160443 scopus 로고
    • Ticknor & Fields, New York
    • S. Augarten. Bit by Bit. Ticknor & Fields, New York, 1984.
    • (1984) Bit by Bit
    • Augarten, S.1
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: A refinement of the mathematical model
    • Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April Available from the National Technical Information Service as document number: AD 780 528
    • D.E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD-TR-73-278, Volume III, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1974. Available from the National Technical Information Service as document number: AD 780 528.
    • (1974) Technical Report ESD-TR-73-278 , vol.3
    • Bell, D.E.1
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November Available from the National Technical Information Service as document number: AD 770 768
    • D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report ESD-TR-73-278, Volume I, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1973. Available from the National Technical Information Service as document number: AD 770 768.
    • (1973) Technical Report ESD-TR-73-278 , vol.1
    • Bell, D.E.1    LaPadula, L.J.2
  • 6
  • 7
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • Bedford, Massachusetts, March Available from the National Technical Information Service as report number: AD A023 588
    • D.E. Bell and L.J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March 1976. Available from the National Technical Information Service as report number: AD A023 588.
    • (1976) Technical Report MTR-2997, the MITRE Corporation
    • Bell, D.E.1    LaPadula, L.J.2
  • 8
    • 0003400255 scopus 로고
    • Technical Report MTR-3153, Revison 1, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April Available from the National Technical Information Service
    • K.J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Revison 1, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1977. Available from the National Technical Information Service.
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K.J.1
  • 10
    • 0039899191 scopus 로고
    • 'On line' in 'Real time'
    • April
    • G. Burck. 'On Line' in 'Real Time'. Fortune, page 141., April 1964.
    • (1964) Fortune , pp. 141
    • Burck, G.1
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D.E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 14
    • 0003969635 scopus 로고
    • Technical Report DOD 5200.28-STD, Department of Defense, Washington, D.C., December
    • Department of Defense. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, Washington, D.C., December 1985.
    • (1985) Department of Defense Trusted Computer System Evaluation Criteria
  • 15
    • 84942214178 scopus 로고
    • Special issue: SAGE (semiautomatic ground environment)
    • October
    • R. Everett, editor. Special issue: SAGE (semiautomatic ground environment). Annals, 5, October 1983.
    • (1983) Annals , vol.5
    • Everett, R.1
  • 17
    • 0002263608 scopus 로고    scopus 로고
    • A new security policy for distributed resource management and access control
    • Lake Arrowhead, California, September
    • S.J. Greenwald. A new security policy for distributed resource management and access control. In Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, California, September 1996.
    • (1996) Proceedings of the 1996 New Security Paradigms Workshop
    • Greenwald, S.J.1
  • 18
    • 0009442659 scopus 로고
    • Monotonie protection systems
    • New York Academic Press. Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, Georgia, October, 1977
    • M.H. Harrison and W.L. Ruzzo. Monotonie protection systems. In Foundations of Secure Computation, pages 337-365, New York, 1978. Academic Press. Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, Georgia, October, 1977.
    • (1978) Foundations of Secure Computation , pp. 337-365
    • Harrison, M.H.1    Ruzzo, W.L.2
  • 20
    • 85052581056 scopus 로고
    • An electric tabulating system
    • B. Randell, editor New York, New York Springer-Verlag
    • H. Hollerith. An electric tabulating system. 1889. In B. Randell, editor, The Origins of Digital Computers, New York, New York, 1982. Springer-Verlag.
    • (1889) The Origins of Digital Computers
    • Hollerith, H.1
  • 22
    • 84941491924 scopus 로고
    • Computer development at IBM
    • J. Metropolis, N. Howlett and G. Rota, editors New York, New York Academic Press
    • C.C. Hurd. Computer development at IBM. In J. Metropolis, N. Howlett and G. Rota, editors, A History of Computing in the Twentieth Century, pages 389-418, New York, New York, 1980. Academic Press.
    • (1980) A History of Computing in the Twentieth Century , pp. 389-418
    • Hurd, C.C.1
  • 23
    • 0009340593 scopus 로고
    • Redefining security
    • Located somewhere in the bowels of the executive branch under the Assistant to the President, National Security Affairs, February
    • Joint Security Commission. Redefining security. Technical report, U.S. Security Policy Board, Located somewhere in the bowels of the executive branch under the Assistant to the President, National Security Affairs, February 1994. Available at http://www.spb.gov/html/jscrpt.html.
    • (1994) Technical Report, U.S. Security Policy Board
  • 24
    • 0003727003 scopus 로고    scopus 로고
    • Scribner, New York, New York
    • D. Kahn. The Code-Breakers. Scribner, New York, New York, 1996.
    • (1996) The Code-Breakers
    • Kahn, D.1
  • 26
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B.W. Lampson. A note on the confinement problem. Communications of the ACM, 19(10):613-615, October 1973.
    • (1973) Communications of the ACM , vol.19 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 28
    • 0003400251 scopus 로고
    • Secure computer systems: A mathematical model
    • Electronic systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November Available from the National Technical Information Service as report number: AD 771 543
    • L.J. LaPadula and D.E. Bell. Secure computer systems: A mathematical model. Technical Report ESD-TR-73-278, Volume II, Electronic systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1974. Available from the National Technical Information Service as report number: AD 771 543.
    • (1974) Technical Report ESD-TR-73-278 , vol.2
    • LaPadula, L.J.1    Bell, D.E.2
  • 29
    • 0022012611 scopus 로고
    • A comment on the "basic security theorem" of bell and LaPadula
    • February
    • J. McLean. A comment on the "basic security theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, February 1985.
    • (1985) Information Processing Letters , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 32
    • 3042750861 scopus 로고
    • Preliminary notes on the design of secure military computer systems
    • Air Force Systems Command, L.C. Hanscom Field, Bedford, Massachusetts, January
    • R.R. Schell, P.J. Downey, and G.J. Popek. Preliminary notes on the design of secure military computer systems. Technical Report MCl-73-1, Electronic Systems Division, Air Force Systems Command, L.C. Hanscom Field, Bedford, Massachusetts, January 1973.
    • (1973) Technical Report MCl-73-1, Electronic Systems Division
    • Schell, R.R.1    Downey, P.J.2    Popek, G.J.3
  • 37
  • 38
    • 85029234787 scopus 로고    scopus 로고
    • Associate Editor IEEE, October
    • M.E. Zurko, Associate Editor, Cipher. Newsletter 29, IEEE, October 1998. Available from htttp://www.itd.nr1.navy.mil/ITD/5540/ieee/cipher/old-issues/issue9810.
    • (1998) Cipher. Newsletter 29
    • Zurko, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.