-
1
-
-
0022659508
-
A Password-Capability System
-
Anderson, M., Pose, R.D., Wallace, C.S. A Password-Capability System, The Computer Journal, 29,1, pp.1-8, 1986.
-
(1986)
The Computer Journal
, vol.29
, Issue.1
, pp. 1-8
-
-
Anderson, M.1
Pose, R.D.2
Wallace, C.S.3
-
2
-
-
0003400251
-
-
Mitre Corp., Bedford, MA, Technical Report
-
Bell, D.E. and LaPadula, L.J., Secure Computer Systems: Mathematical Foundations, Mitre Corp., Bedford, MA, Technical Report ESD-TR-73-278, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
0004297283
-
-
Addison-Wesley
-
Blakley, B., Blakley, R., Soley, R.M., CORBA Security: An Introduction to Safe Computing with Objects, Addison-Wesley, 2000.
-
(2000)
CORBA Security: An Introduction to Safe Computing with Objects
-
-
Blakley, B.1
Blakley, R.2
Soley, R.M.3
-
4
-
-
84982980436
-
A View-Based Access Control Model for CORBA
-
Jan Vitek, Christian Jensen (eds.), Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer
-
Brose, G., A View-Based Access Control Model for CORBA, in: Jan Vitek, Christian Jensen (eds.), Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, Springer 1999.
-
(1999)
LNCS
, vol.1603
-
-
Brose, G.1
-
5
-
-
0141876269
-
Generalized Role-based Access Control for Securing Future Applications
-
Baltimore
-
Covington, M.J., Moyer, M.J. and Ahamad, M., Generalized Role-based Access Control for Securing Future Applications, Proc. 23rd National Information Systems Security Conference, Baltimore, 2000.
-
(2000)
Proc. 23rd National Information Systems Security Conference
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
6
-
-
3242760396
-
The COM+ Security Model Gets You Out of the Security Programming Business
-
Nov
-
Eddon, G., The COM+ Security Model Gets You Out of the Security Programming Business, Microsoft Systems Journal, Nov. 1999.
-
(1999)
Microsoft Systems Journal
-
-
Eddon, G.1
-
7
-
-
84961671415
-
A Two-Level Architecture for Semantic Protection of Persistent Distributed Objects
-
Wollongong
-
Evered, M., A Two-Level Architecture for Semantic Protection of Persistent Distributed Objects, Proc. Intl. Conf. on Software Methods and Tools, Wollongong, 2000.
-
(2000)
Proc. Intl. Conf. on Software Methods and Tools
-
-
Evered, M.1
-
11
-
-
0002262722
-
Role Based Access Control: Features and Motivations
-
Ferraiolo, D.F., Cugini, J.A. and Kuhn, D.R., Role Based Access Control: Features and Motivations, Proc. 11th Annual Computer Security Applications Conference, 1995.
-
(1995)
Proc. 11th Annual Computer Security Applications Conference
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.R.3
-
12
-
-
84969562018
-
Merging Capabilities with the Object Model of an Object-Oriented Abstract Machine
-
Brussels
-
Fondón, M.A. et al. Merging Capabilities with the Object Model of an Object-Oriented Abstract Machine, 12th European Conference on Object-Oriented Programming, Brussels, 1998
-
(1998)
12th European Conference on Object-Oriented Programming
-
-
Fondón, M.A.1
-
15
-
-
0003518498
-
-
Reading, MA: Addison-Wesley
-
Gosling, J., Joy, B. and Steele, G., The Java Language Specification, Reading, MA: Addison-Wesley, 1996.
-
(1996)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
16
-
-
0016984825
-
Protection in Operating Systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D., Protection in Operating Systems, Communications of the ACM, 19, 8, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
17
-
-
0000206310
-
Security Models for Web-based Applications
-
Joshi, J.B.D. et al., Security Models for Web-based Applications, Communications of the ACM, 44, 2, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
-
-
Joshi, J.B.D.1
-
18
-
-
0017971337
-
A language extension for expressing constraints on data access
-
May
-
Jones, A. and Liskov, B. A language extension for expressing constraints on data access. Communications of the ACM, 21(5):358-367, May 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.1
Liskov, B.2
-
19
-
-
2942757340
-
Software Reuse in an Object Oriented Framework: Distinguishing Types from Implementations and Objects from Attributes
-
Vienna
-
Keedy, J.L., et al., "Software Reuse in an Object Oriented Framework: Distinguishing Types from Implementations and Objects from Attributes", Proc. Sixth International Conference on Software Reuse, Vienna, 2000.
-
(2000)
Proc. Sixth International Conference on Software Reuse
-
-
Keedy, J.L.1
-
20
-
-
1542716504
-
Persistent Protected Modules and Persistent Processes as the Base for a More Secure Operating System
-
Keedy, J.L. and Vosseberg, K., Persistent Protected Modules and Persistent Processes as the Base for a More Secure Operating System, Proc. 25th Hawaii Intl. Conf. on System Sciences, 1992.
-
(1992)
Proc. 25th Hawaii Intl. Conf. on System Sciences
-
-
Keedy, J.L.1
Vosseberg, K.2
-
23
-
-
0022766760
-
The Design of a Capability-Based Distributed Operating System
-
Mullender, S.J., Tanenbaum, A.S. The Design of a Capability-Based Distributed Operating System, Computer Journal, 29,4, pp.289-299, 1986.
-
(1986)
Computer Journal
, vol.29
, Issue.4
, pp. 289-299
-
-
Mullender, S.J.1
Tanenbaum, A.S.2
-
26
-
-
84976851216
-
Mandatory Security in Object-Oriented Database Systems
-
Proc. Intl. Conf. on Object-Oriented Programming Systems, Languages and Applications
-
Thuraisingham, M.B., Mandatory Security in Object-Oriented Database Systems, Proc. Intl. Conf. on Object-Oriented Programming Systems, Languages and Applications, ACM Sigplan Notices, 24, 10, 1989.
-
(1989)
ACM Sigplan Notices
, vol.24
, Issue.10
-
-
Thuraisingham, M.B.1
|