메뉴 건너뛰기




Volumn 1, Issue 1, 2005, Pages 157-159

Problems Column

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85024259027     PISSN: 15496325     EISSN: 15496333     Source Type: Journal    
DOI: 10.1145/1077464.1077475     Document Type: Article
Times cited : (1)

References (42)
  • 1
    • 85024244467 scopus 로고
    • AIM Technology published price list
    • Santa Clara, CA.
    • Aim Technology. 1988. AIM Technology published price list. AIM Technology, Santa Clara, CA.
    • (1988) AIM Technology
  • 2
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • ESD-TR-73-51. James P. Anderson and Co., Fort Washington, PA
    • Anderson, J. P. 1972. Computer security technology planning study. Tech. Rep. ESD-TR-73-51. James P. Anderson and Co., Fort Washington, PA.
    • (1972) Tech. Rep.
    • Anderson, J.P.1
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • ESD-TR-75-306; ESD/AFSC; DTIC AD-A023588
    • Bell, D. E. and La Padula, L. 1975. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. ESD-TR-75-306; ESD/AFSC; DTIC AD-A023588.
    • (1975) Tech. Rep.
    • Bell, D.E.1    La Padula, L.2
  • 9
    • 0011588485 scopus 로고
    • Trusted products evaluation
    • (July)
    • Chokhani, S. 1992. Trusted products evaluation. Commun. ACM 35, 7 (July), 64-76.
    • (1992) Commun. ACM , vol.35 , Issue.7 , pp. 64-76
    • Chokhani, S.1
  • 10
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
    • Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.
    • (1987) Proceedings of the IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.1    Wilson, D.2
  • 11
    • 0018466858 scopus 로고
    • Social processes and proofs of theorems and programs
    • (May)
    • Demillo, R. A., Lipton, R. J., and Perlis, A. J. 1979. Social processes and proofs of theorems and programs. Commun. ACM 22, 5 (May).
    • (1979) Commun. ACM , vol.22 , Issue.5
    • Demillo, R.A.1    Lipton, R.J.2    Perlis, A.J.3
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • (May)
    • Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2 (May), 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.2 , pp. 236-243
    • Denning, D.E.1
  • 15
    • 0003969635 scopus 로고
    • Department of Defense trusted computer system evaluation criteria
    • Department of Defense Standard DoD 5200. 28-STD.
    • DOD. 1985. Department of Defense trusted computer system evaluation criteria. Department of Defense Standard DoD 5200. 28-STD.
    • (1985)
  • 16
    • 2442558738 scopus 로고
    • Computer security requirements: Guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments
    • CSC-STD-003-85
    • DOD COMPUTER SECURITY CENTER. 1985. Computer security requirements: Guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. CSC-STD-003-85.
    • (1985)
  • 20
    • 84916338765 scopus 로고
    • Report on the language Gypsy
    • Tech Rep. ICSCA-CMP-10. University of Texas at Austin, Austin, TX
    • Good, D. I., Cohen, R. M., Hoch, C. G., Hunter, L. W., and Hare, D. F. 1978. Report on the language Gypsy. Tech Rep. ICSCA-CMP-10. University of Texas at Austin, Austin, TX.
    • (1978)
    • Good, D.I.1    Cohen, R.M.2    Hoch, C.G.3    Hunter, L.W.4    Hare, D.F.5
  • 21
    • 0023292465 scopus 로고
    • Extending the noninterference version of MLS for SAT
    • Haigh, T. J. and Young, W. D. 1987. Extending the noninterference version of MLS for SAT. IEEE Trans. Softw. Eng. 13, 2.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2
    • Haigh, T.J.1    Young, W.D.2
  • 22
    • 85024249015 scopus 로고
    • Throughput benchmarks with AIM
    • LOCK program archives
    • Kain, R. Y. 1988. Throughput benchmarks with AIM. Memorandum. LOCK program archives.
    • (1988) Memorandum
    • Kain, R.Y.1
  • 23
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • (Oct.)
    • Lampson, B. 1973. A note on the confinement problem. Commun. ACM 16, 10 (Oct.).
    • (1973) Commun. ACM , vol.16 , Issue.10
    • Lampson, B.1
  • 25
    • 85024285793 scopus 로고
    • Secure system development at Digital Equipment: Targeting the needs of a commercial and government customer base
    • (Sept.)
    • Lipner, S. 1985. Secure system development at Digital Equipment: Targeting the needs of a commercial and government customer base. In Proceedings of the 8th National Conference on Computer Security (Sept.). 47-54.
    • (1985) Proceedings of the 8th National Conference on Computer Security , pp. 47-54
    • Lipner, S.1
  • 26
    • 85024248228 scopus 로고    scopus 로고
    • Trusted network interpretation of the trusted computer system evaluation criteria
    • NCSC-TG-005, Version 1
    • NATIONAL COMPUTER SECURITY CENTER. 1997. Trusted network interpretation of the trusted computer system evaluation criteria. NCSC-TG-005, Version 1.
    • (1997)
  • 27
    • 0010853725 scopus 로고
    • Introduction to certification and accreditation
    • NCSC-TG-029, Version 1
    • NATIONAL COMPUTER SECURITY CENTER. 1994. Introduction to certification and accreditation. NCSC-TG-029, Version 1.
    • (1994)
  • 28
    • 85024262698 scopus 로고
    • Provably secure operating system. M79-225. Institute of Communication Research, Stanford University, Stanford, CA.
    • Neumann, P. G., Robinson, L., Levitt, K. N., Boyer, R. S., and Saxena, A. R. 1975. Provably secure operating system. M79-225. Institute of Communication Research, Stanford University, Stanford, CA.
    • (1975)
    • Neumann, P.G.1    Robinson, L.2    Levitt, K.N.3    Boyer, R.S.4    Saxena, A.R.5
  • 30
    • 0016626427 scopus 로고
    • The source code control system
    • (Dec.)
    • Rochkind, M. J. 1975. The source code control system. IEEE Trans. Softw. Eng. SE-1, 4 (Dec.), 364-370.
    • (1975) IEEE Trans. Softw. Eng. SE-1 , Issue.4 , pp. 364-370
    • Rochkind, M.J.1
  • 31
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 34
    • 85024251190 scopus 로고
    • LOCK/ix: on implementing Unix on the LOCK TCB
    • (NIST-NCSC, Baltimore, MD, Oct. 17-20). National Institute of Standards and Technology, Gaithersburg, MD
    • Schaffer, M. A. and Walsh, G. 1988. LOCK/ix: on implementing Unix on the LOCK TCB. In Proceedings of the 11th National Conference on Computer Security (NIST-NCSC, Baltimore, MD, Oct. 17-20). National Institute of Standards and Technology, Gaithersburg, MD.
    • (1988) Proceedings of the 11th National Conference on Computer Security
    • Schaffer, M.A.1    Walsh, G.2
  • 36
    • 85024278257 scopus 로고    scopus 로고
    • Sidewinder: Defense in depth using type enforcement
    • Smith, R. E. 1996. Sidewinder: Defense in depth using type enforcement. J. Syst. Manage.
    • (1996) J. Syst. Manage.
    • Smith, R.E.1
  • 40
    • 85024253475 scopus 로고    scopus 로고
    • Is your network secure?
    • (Jan.)
    • Thomsen, D. and Schwartau, W. 1996. Is your network secure? BYTE (Jan.).
    • (1996) BYTE
    • Thomsen, D.1    Schwartau, W.2
  • 41
    • 0006291871 scopus 로고
    • Security controls for computer systems (U): Report of Defense Science Board Task Force on Computer Security
    • Rand Rep. R609-1. RAND, Santa Monica, CA
    • Ware, W. 1970. Security controls for computer systems (U): Report of Defense Science Board Task Force on Computer Security. Rand Rep. R609-1. RAND, Santa Monica, CA.
    • (1970)
    • Ware, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.