메뉴 건너뛰기




Volumn 55, Issue C, 2002, Pages 185-235

Security policies

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85016047463     PISSN: 00652458     EISSN: None     Source Type: Book Series    
DOI: 10.1016/S0065-2458(01)80030-9     Document Type: Article
Times cited : (11)

References (81)
  • 2
    • 0004200684 scopus 로고
    • Computer Security Technology Planning Study
    • AD-758 206, ESD/AFSC Oct AFSC, Hanscom AFB Oct Bedford, MA Oct
    • AD-758 206, ESD/AFSCAnderson, J., Computer Security Technology Planning Study. Tech. Rep. ESD-TR-73-51, Oct 1972, AFSC, Hanscom AFB, Bedford, MA.
    • (1972) Tech. Rep. ESD-TR-73-51
    • Anderson, J.1
  • 4
    • 0029697680 scopus 로고    scopus 로고
    • A Security Policy Model for Clinical Information Systems
    • Research in Security and Privacy May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press May Oakland, CA May
    • Research in Security and PrivacyAnderson, Ross, A Security Policy Model for Clinical Information Systems. Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1996, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 30–43.
    • (1996) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 30-43
    • Anderson, R.1
  • 6
    • 79957677761 scopus 로고    scopus 로고
    • The DeCODE Proposal for an Icelandic Health Database
    • URL Nov The printed article is an excerpt from a document produced for the Icelandic Medical Association. The full text of the latter is available online Nov
    • URLAnderson, Ross J., The DeCODE Proposal for an Icelandic Health Database. L/oeknabladhidh (The Icelandic Medical Journal 84:11 (Nov 1998), 874–875 http://www.cl.cam.ac.uk/users/rja14/iceland/iceland.html The printed article is an excerpt from a document produced for the Icelandic Medical Association. The full text of the latter is available online.
    • (1998) L/oeknabladhidh (The Icelandic Medical Journal , vol.84 , Issue.11 , pp. 874-875
    • Anderson, R.J.1
  • 9
    • 0028532579 scopus 로고
    • Why Cryptosystems Fail
    • Anderson, Ross John, Why Cryptosystems Fail. Communications of the ACM 37:11 (1994), 32–40.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 12
    • 85023103661 scopus 로고    scopus 로고
    • Jiki—A New Framework for Security Policy, Trusted Publishing and Electronic Commerce
    • to appear.
    • Ross John Anderson and Jong-Hyeon Lee: “Jiki—A New Framework for Security Policy, Trusted Publishing and Electronic Commerce”. Computer Communications to appear.
    • Computer Communications
    • John Anderson, R.1    Lee, J.-H.2
  • 14
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations
    • Mitre Corporation Apr Bedford, MA Apr
    • Bell, D. Elliot, LaPadula, Leonard J., Secure Computer Systems: Mathematical Foundations. Mitre Report ESD-TR-73-278, Vol. I–III, Apr 1974, Mitre Corporation, Bedford, MA.
    • (1974) Mitre Report ESD-TR-73-278 , vol.1-3
    • Bell, D.E.1    LaPadula, L.J.2
  • 15
    • 85023106125 scopus 로고
    • BFE Applicability to LAN Environments
    • NIST 11–14 Oct Baltimore, Maryland 11–14 Oct
    • Benkart, T., Bitzer, D., BFE Applicability to LAN Environments. Seventeenth National Computer Security Conference, 11–14 Oct 1994, NIST, Baltimore, Maryland, 227–236.
    • (1994) Seventeenth National Computer Security Conference , pp. 227-236
    • Benkart, T.1    Bitzer, D.2
  • 16
    • 85072523275 scopus 로고
    • KSOS-Development Methodology for a Secure Operating System
    • AFIPS, AFIPS Press Jun Montvale, NJ Jun
    • Berson, T., Barksdale, G., KSOS-Development Methodology for a Secure Operating System. Proc. NCC, Jun 1979, AFIPS, AFIPS Press, Montvale, NJ, 365–371.
    • (1979) Proc. NCC , pp. 365-371
    • Berson, T.1    Barksdale, G.2
  • 17
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computing Systems
    • Mitre Corporation Bedford, MA
    • Biba, Ken, Integrity Considerations for Secure Computing Systems. Mitre Report MTR-3153, 1975, Mitre Corporation, Bedford, MA.
    • (1975) Mitre Report MTR-3153
    • Biba, K.1
  • 18
    • 0003226048 scopus 로고    scopus 로고
    • The Key Note Trust-Management System Version 2
    • URL Sep Internet Engineering Task Force Sep
    • URLBlaze, Matt, Feigenbaum, Joan, Ioannidis, John, Keromytis, A., The Key Note Trust-Management System Version 2. IETF RFC 2704, Sep 1999, Internet Engineering Task Force http://www.cis.ohio/state.edu/htbin/rfc/rfc2704.html.
    • (1999) IETF RFC 2704
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 23
    • 85022988460 scopus 로고
    • Data Communications Networks Directory
    • Recommendations X.500-X.521, IXth Plenary Assembly Nov CCITT Nov Melbourne Nov
    • Recommendations X.500-X.521, IXth Plenary Assembly CCITT, Data Communications Networks Directory. Tech. Rep. 8, Nov 1988, CCITT, Melbourne.
    • (1988) Tech. Rep. 8
    • CCITT1
  • 24
    • 0023266943 scopus 로고
    • A Comparison of Commerical and Military Computer Security Policies
    • Oakland, CA
    • Oakland, CAClark, David D., Wilson, David R., A Comparison of Commerical and Military Computer Security Policies. 1987 IEEE Symposium on Security and Privacy, 1987, 184–194.
    • (1987) 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 25
    • 0024105910 scopus 로고
    • A Field Study of the Software Design Process for Large Systems
    • Nov
    • Curtis, Bill, Krasner, Herb, Iscoe, Neil, A Field Study of the Software Design Process for Large Systems. Communications of the ACM 31:11 (Nov 1988), 1268–1287.
    • (1988) Communications of the ACM , vol.31 , Issue.11 , pp. 1268-1287
    • Curtis, B.1    Krasner, H.2    Iscoe, N.3
  • 26
    • 0033562565 scopus 로고    scopus 로고
    • Privacy in clinical information systems in secondary care
    • May
    • Denley, I., Weston-Smith, S., Privacy in clinical information systems in secondary care. British Medical Journal 318 (May 1999), 1328–1331.
    • (1999) British Medical Journal , vol.318 , pp. 1328-1331
    • Denley, I.1    Weston-Smith, S.2
  • 27
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • (5) May Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975)
    • Dorothy E., Denning, A Lattice Model of Secure Information Flow. Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975) Communications of the ACM, 19, May 1976, 236–243.
    • (1976) Communications of the ACM , vol.19 , pp. 236-243
    • Dorothy E., D.1
  • 28
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • Denning, Dorothy E., A Lattice Model of Secure Information Flow. Communications of the ACM 19:5 (May 1976), 236–243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 31
    • 0033295882 scopus 로고    scopus 로고
    • The nature of a useable PKI
    • May
    • Ellison, Carl, The nature of a useable PKI. Computer Networks 31:8 (May 1999), 823–830.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 823-830
    • Ellison, C.1
  • 32
    • 0003358457 scopus 로고    scopus 로고
    • SPKI Certificate Theory
    • URL Sep Internet Engineering Task Force Sep
    • URLEllison, Carl M., Frantz, Bill, Lampson, Butler, Rivest, Ron, Thomas, Brian M., Ylonen, Tatu, SPKI Certificate Theory. IETF RFC 2693, Sep 1999, Internet Engineering Task Force http://www.cis.ohio.state.edu/htbin/rfc/rfc2693.html.
    • (1999) IETF RFC 2693
    • Ellison, C.M.1    Frantz, B.2    Lampson, B.3    Rivest, R.4    Thomas, B.M.5    Ylonen, T.6
  • 34
    • 85009076310 scopus 로고
    • User Interface for a High Assurance Windowing System
    • 6–10 Dec, IEEE Orlando, Florida, USA, 0-8186-4330-7
    • Epstein, J., Pascale, R., User Interface for a High Assurance Windowing System. Ninth Annual Computer Security Applications Conference, 6–10 Dec 1993, IEEE, Orlando, Florida, USA 0-8186-4330-7, 256–264.
    • (1993) Ninth Annual Computer Security Applications Conference , pp. 256-264
    • Epstein, J.1    Pascale, R.2
  • 36
    • 0012779604 scopus 로고
    • Information Protection Systems
    • Cambridge University
    • Fenton, J.S., Information Protection Systems. PhD dissertation, 1973, Cambridge University.
    • (1973) PhD dissertation
    • Fenton, J.S.1
  • 38
    • 84974747910 scopus 로고
    • Aggregation and separation as noninterference properties
    • Foley, Simon N., Aggregation and separation as noninterference properties. Journal of Computer Security 1:2 (1992), 158–188.
    • (1992) Journal of Computer Security , vol.1 , Issue.2 , pp. 158-188
    • Foley, S.N.1
  • 39
    • 0020778471 scopus 로고
    • SCOMP: A Solution to the Multilevel Security Problem
    • Jul
    • Fraim, L.J., SCOMP: A Solution to the Multilevel Security Problem. Computer 16:7 (Jul 1983), 26–34.
    • (1983) Computer , vol.16 , Issue.7 , pp. 26-34
    • Fraim, L.J.1
  • 40
    • 0033690785 scopus 로고    scopus 로고
    • LOMAC: Low Water-Mark Integrity Protection for COTS Environments
    • IEEE Computer Society Press
    • Fraser, T., LOMAC: Low Water-Mark Integrity Protection for COTS Environments. Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000, IEEE Computer Society Press, 230–245.
    • (2000) Proceedings of the 2000 IEEE Symposium on Security and Privacy , pp. 230-245
    • Fraser, T.1
  • 42
    • 84974740905 scopus 로고
    • Compartmented Mode, Workstation Evaluation Criteria, Version 1
    • (also published by the Defense Intelligence Agency as document DDS-2600-6243-91) Jun Revised requirements for the CMW, including a description of what they expect for Trusted X Jun The MITRE Corporation Jun Bedford, MA, USA Jun
    • (also published by the Defense Intelligence Agency as document DDS-2600-6243-91)Graubart, R.D., Berger, J.L., Woodward, J.P.L., Compartmented Mode, Workstation Evaluation Criteria, Version 1. Revised requirements for the CMW, including a description of what they expect for Trusted X Tech. Rep. MTR 10953, Jun 1991, The MITRE Corporation, Bedford, MA, USA.
    • (1991) Tech. Rep. MTR 10953
    • Graubart, R.D.1    Berger, J.L.2    Woodward, J.P.L.3
  • 44
    • 85023031369 scopus 로고
    • CMW Introduction
    • Oct
    • Huber, G., CMW Introduction. ACM SIGSAC 12:4 (Oct 1994), 6–10.
    • (1994) ACM SIGSAC , vol.12 , Issue.4 , pp. 6-10
    • Huber, G.1
  • 45
    • 0027719713 scopus 로고
    • A Pump for Rapid, Reliable, Secure Communications
    • ACM 3–5 November, 1993, Fairfax, Virginia ACM Press New York, NY 10036, USA, 0-89791-629-8
    • Kang, M.H., Moskowitz, I.S., A Pump for Rapid, Reliable, Secure Communications. ACM, (eds.) Fairfax 93: 1st ACM Conference on Computer and Communications Security, 3–5 November, 1993, Fairfax, Virginia, 1993, ACM Press, New York, NY 10036, USA 0-89791-629-8, 118–129.
    • (1993) Fairfax 93: 1st ACM Conference on Computer and Communications Security , pp. 118-129
    • Kang, M.H.1    Moskowitz, I.S.2
  • 46
    • 0031337629 scopus 로고    scopus 로고
    • An Architecture for Multilevel Secure Interoperability
    • 8–12 Dec IEEE Computer Society San Diego, CA, USA, 0-8186-8274-4
    • Kang, M.H., Froscher, J.N., Moskowitz, I.S., An Architecture for Multilevel Secure Interoperability. 13th Annual Computer Security Applications Conference, 8–12 Dec 1997, IEEE Computer Society, San Diego, CA, USA 0-8186-8274-4, 194–204.
    • (1997) 13th Annual Computer Security Applications Conference , pp. 194-204
    • Kang, M.H.1    Froscher, J.N.2    Moskowitz, I.S.3
  • 49
    • 85023128660 scopus 로고    scopus 로고
    • Designing a reliable publishing framework
    • University of Cambridge Computer Laboratory Apr
    • Lee, Jong-Hyeon, Designing a reliable publishing framework. Tech. Rep. 489, Apr 2000, University of Cambridge Computer Laboratory.
    • (2000) Tech. Rep. 489
    • Lee, J.-H.1
  • 51
    • 0009825122 scopus 로고
    • Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon's ring)
    • Borotha-Schoeler Wien
    • Lorenz, Konrad, Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon's ring). 1949, Borotha-Schoeler, Wien.
    • (1949)
    • Lorenz, K.1
  • 52
    • 0025438880 scopus 로고
    • A Hookup Theorem for Multilevel Security
    • Special Section on Security and Privacy Jun
    • Special Section on Security and PrivacyMcCullough, Daryl, A Hookup Theorem for Multilevel Security. IEEE Transactions on Software Engineering 16:6 (Jun 1990), 563–568.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 563-568
    • McCullough, D.1
  • 54
    • 0022012611 scopus 로고
    • A comment on the ‘basic security theorem’ of Bell and LaPadula
    • Feb
    • McLean, John, A comment on the ‘basic security theorem’ of Bell and LaPadula. Information Processing Letters 20:2 (Feb 1985), 67–70.
    • (1985) Information Processing Letters , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 56
    • 0344001154 scopus 로고
    • The Formal Specification of Safety Requirements for Storing Explosives
    • Mukherjee, Paul, Stavridou, Victoria, The Formal Specification of Safety Requirements for Storing Explosives. Formal aspects of Computing 5:4 (1993), 299–336.
    • (1993) Formal aspects of Computing , vol.5 , Issue.4 , pp. 299-336
    • Mukherjee, P.1    Stavridou, V.2
  • 57
    • 85023078096 scopus 로고    scopus 로고
    • Implementing Security Policy in a Large Defence Procurement
    • 9–13 Dec IEEE San Diego, CA, USA, 0-8186-7606-X
    • Nash, M., Kennett, R., Implementing Security Policy in a Large Defence Procurement. 12th Annual Computer Security Applications Conference, 9–13 Dec 1996, IEEE, San Diego, CA, USA 0-8186-7606-X, 15–23.
    • (1996) 12th Annual Computer Security Applications Conference , pp. 15-23
    • Nash, M.1    Kennett, R.2
  • 58
    • 85023095376 scopus 로고    scopus 로고
    • Tech. rep., NSA. URL
    • National Security Agency “The NSA Security Manual”. Tech. rep., NSA. URL.
    • The NSA Security Manual
  • 59
    • 85023123468 scopus 로고    scopus 로고
    • (Leaked copy.)
    • http://www.cl.cam.ac.uk/ftp/users/rja14/nsaman.tex.gz (Leaked copy.).
  • 60
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Needham, Roger Michael, Schroeder, Michael, Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21:12 (1978), 993–999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.2
  • 62
    • 85023065664 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Version 2.1
    • URL Jan
    • URL NIST, Common Criteria for Information Technology Security Version 2.1. Tech. Rep. ISO IS 15408, Jan 2000 http://csrc.nist.gov/cc/.
    • (2000) Tech. Rep. ISO IS 15408
    • NIST1
  • 64
    • 15944418695 scopus 로고    scopus 로고
    • Private Desktops and Shared Store
    • IEEE Phoenix, AZ, USA, 0-8186-8789-4
    • Pomeroy, B., Wiseman, S., Private Desktops and Shared Store. Computer Security Applications Conference, 1998, IEEE, Phoenix, AZ, USA 0-8186-8789-4, 190–200.
    • (1998) Computer Security Applications Conference , pp. 190-200
    • Pomeroy, B.1    Wiseman, S.2
  • 65
    • 0003614529 scopus 로고    scopus 로고
    • SDSI—A Simple Distributed Security Infrastructure
    • URL Apr
    • URLRivest, Ronald L., Lampson, Butler W., SDSI—A Simple Distributed Security Infrastructure. V1.0 presented at USENIX 96 and Crypto 96, Apr 1996 http://theory.lcs.mit.edu/~cis/sdsi.html.
    • (1996) V1.0 presented at USENIX 96 and Crypto 96
    • Rivest, R.L.1    Lampson, B.W.2
  • 66
    • 0020779556 scopus 로고
    • A Distributed Secure System
    • IEEE Jul
    • Rushby, J., Randell, B., A Distributed Secure System. IEEE Computer, Jul 1983, IEEE, 55–67.
    • (1983) IEEE Computer , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 67
    • 3943108716 scopus 로고
    • Computer Security: The Achilles' Heel of the Electronic Air Force?
    • Jan–Feb
    • Schell, RR, Computer Security: The Achilles' Heel of the Electronic Air Force?. Air University Review 30:2 (Jan–Feb 1979), 16–33.
    • (1979) Air University Review , vol.30 , Issue.2 , pp. 16-33
    • Schell, R.R.1
  • 68
    • 3042750861 scopus 로고
    • Preliminary notes on the design of secure military computer systems
    • URL 1 Jan Electronic Systems Division, Air Force Systems Command 1 Jan
    • URLSchell, RR, Downey, PJ, Popek, GJ, Preliminary notes on the design of secure military computer systems. Tech. Rep. MCI-73-1, 1 Jan 1973, Electronic Systems Division, Air Force Systems Command http://seclab.cs.ucdavis.edu/projects/history/papers/sche73.pdf.
    • (1973) Tech. Rep. MCI-73-1
    • Schell, R.R.1    Downey, P.J.2    Popek, G.J.3
  • 69
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
    • URL Also available as AT&T Laboratories Cambridge Technical Report 1999.2 Bruce Christianson Bruno Crispo Mike Roe Springer-Verlag
    • URLStajano, Frank, Anderson, Ross, The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. Also available as AT&T Laboratories Cambridge Technical Report 1999.2 Christianson, Bruce, Crispo, Bruno, Roe, Mike, (eds.) Security Protocols, 7th International Workshop Proceedings Lecture Notes in Computer Science, 1999, Springer-Verlag http://www.cl.cam.ac.uk/~fm7/ducking/.
    • (1999) Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science
    • Stajano, F.1    Anderson, R.2
  • 70
    • 0010050863 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
    • URL Oct Abridged and revised version of the Security Protocols article by the same name. Also available as AT&T Laboratories Cambridge, Technical Report 1999.2b Oct
    • rd AT&T Software Symposium, Middletown, New Jersey, USA, Oct 1999 http://www.cl.cam.ac.uk/~fm7/duckling/.
    • (1999) rd AT&T Software Symposium, Middletown, New Jersey, USA
    • Stajano, F.1    Anderson, R.2
  • 72
    • 0346779433 scopus 로고
    • Technical Rationale behind CSC-STD-003-85: computer security requirements
    • US Department of Defense
    • US Department of Defense, Technical Rationale behind CSC-STD-003-85: computer security requirements. Tech. Rep. CSC-STD-004-85, 1985, US Department of Defense.
    • (1985) Tech. Rep. CSC-STD-004-85
    • US Department of Defense1
  • 73
    • 0003969633 scopus 로고
    • Trusted Computer System Evaluation Criteria
    • US Department of Defense
    • US Department of Defense, Trusted Computer System Evaluation Criteria. Tech. Rep. 5200.28, 1985, US Department of Defense.
    • (1985) Tech. Rep. 5200.28
    • US Department of Defense1
  • 76
    • 4544284713 scopus 로고
    • Security Controls in the ADEPT-50 Time-Sharing System
    • Weissman, Clark, Security Controls in the ADEPT-50 Time-Sharing System. Proc. Fall Joint Computer Conference, AFIPS, vol. 35, 1969, 119–133.
    • (1969) Proc. Fall Joint Computer Conference, AFIPS , vol.35 , pp. 119-133
    • Weissman, C.1
  • 79
    • 33751037227 scopus 로고
    • Security Requirements for System High and Compartmented Mode Workstations
    • Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87) Nov The original requirements for the CMW, including a description of what they expect for Trusted X Nov The MITRE Corporation Nov Bedford, MA, USA Nov
    • Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87)Woodward, J.P.L., Security Requirements for System High and Compartmented Mode Workstations. The original requirements for the CMW, including a description of what they expect for Trusted X Tech. Rep. MTR 9992, Nov 1987, The MITRE Corporation, Bedford, MA, USA.
    • (1987) Tech. Rep. MTR 9992
    • Woodward, J.P.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.