-
1
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
Oakland CA, May
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, S. A. Haghighat, "Practical Domain and Type Enforcement for UNIX," 1995 IEEE Symposium on Security and Privacy, Oakland CA, May 1995.
-
(1995)
1995 IEEE Symposium on Security and Privacy
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
2
-
-
0024666222
-
A model for specifying multi-granularity integrity policies
-
Oakland, CA, May
-
L. Badger, "A Model for Specifying Multi-Granularity Integrity Policies," 1989 IEEE Symposium on Security and Privacy, p. 269, Oakland, CA, May 1989.
-
(1989)
1989 IEEE Symposium on Security and Privacy
, pp. 269
-
-
Badger, L.1
-
3
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
Oakland, CA, May
-
R.W. Baldwin, "Naming and Grouping Privileges to Simplify Security Management in Large Databases," Proceedings of the 1990 IEEE Symposium on Security and Privacy, p. 116, Oakland, CA, May 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 116
-
-
Baldwin, R.W.1
-
4
-
-
0003400251
-
-
Technical Report No. ESD-TR-75-306, Electronics Systems Division, AFSC, Hanscom AF Base, Bedford MA
-
D.E. Bell and L. Lapadula, "Secure Computer System: Unified Exposition and Multics Interpretation," (Technical Report No. ESD-TR-75-306, Electronics Systems Division, AFSC, Hanscom AF Base, Bedford MA, 1976).
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Lapadula, L.2
-
5
-
-
85077760008
-
-
Department of Computer Science, Cornell University, June
-
K.P. Birman, T. Joseph, K. Kane, F. Schmuck, "The ISIS Programming Manual and User's Guide," Department of Computer Science, Cornell University, June 1988.
-
(1988)
The ISIS Programming Manual and User's Guide
-
-
Birman, K.P.1
Joseph, T.2
Kane, K.3
Schmuck, F.4
-
6
-
-
0003400255
-
-
USAF Electronic Systems Division, Bedford, MA, ESD-TR-76-372
-
K.J. Biba, "Integrity Considerations for Secure Computer Systems," USAF Electronic Systems Division, Bedford, MA, ESD-TR-76-372, 1977.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
7
-
-
0024663398
-
Access mediation in a message passing kernel
-
Oakland, CA, May
-
M. Branstad, H. Tajalli, F. Mayer, D. Dalva, "Access Mediation in a Message Passing Kernel," 1989 IEEE Symposium on Security and Privacy, p. 66, Oakland, CA, May 1989.
-
(1989)
1989 IEEE Symposium on Security and Privacy
, pp. 66
-
-
Branstad, M.1
Tajalli, H.2
Mayer, F.3
Dalva, D.4
-
8
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA
-
D.D. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, p. 184, 1987.
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 184
-
-
Clark, D.D.1
Wilson, D.R.2
-
9
-
-
0003282331
-
A practical alternative to hierarchical integrity policies
-
Gaithersburg, MD
-
W.E. Boebert and R.Y. Kain, "A Practical Alternative to Hierarchical Integrity Policies," Proceedings of the 8th National Computer Security Conference, Gaithersburg, MD, p. 18, 1985.
-
(1985)
Proceedings of the 8th National Computer Security Conference
, pp. 18
-
-
Boebert, W.E.1
Kain, R.Y.2
-
10
-
-
85077735346
-
The architecture and implementation of network-layer security under unix
-
Boston MA
-
J. Ioannidis, M. Blaze, "The Architecture and Implementation of Network-Layer Security Under Unix," Presented at the USENIX Summer 1994 Technical Conference, Boston MA.
-
USENIX Summer 1994 Technical Conference
-
-
Ioannidis, J.1
Blaze, M.2
-
11
-
-
0003508568
-
-
Jan. Federal Information Processing Standards Publication 46
-
NBS, "Data Encryption Standard," Jan. 1977. Federal Information Processing Standards Publication 46.
-
(1977)
Data Encryption Standard
-
-
-
13
-
-
60649097500
-
Extending the UNIX protection model with access control lists
-
San Francisco, CA
-
G. Fernandez, L. Allen, "Extending the UNIX Protection Model with Access Control Lists," Proceedings of the Summer 1988 USENIX Conference, San Francisco, CA, 1988, p. 119.
-
(1988)
Proceedings of the Summer 1988 USENIX Conference
, pp. 119
-
-
Fernandez, G.1
Allen, L.2
-
14
-
-
0027287175
-
Assuring distributed trusted Mach
-
Oakland, CA
-
T. Fine and S. E. Minear, "Assuring Distributed Trusted Mach," 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, p. 206, 1993.
-
(1993)
1993 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 206
-
-
Fine, T.1
Minear, S.E.2
-
15
-
-
0003899818
-
The kerberos network authentication service (V5)
-
September
-
J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, September 1993.
-
(1993)
RFC 1510
-
-
Kohl, J.1
Neuman, C.2
-
17
-
-
84976780900
-
A security model for military message systems
-
August
-
C.E. Landwehr, C.L. Heitmeyer, and J. McLean, "A Security Model for Military Message Systems," ACM Transactions on Computer Systems, Vol. 2, No. 3, August 1984, pp. 198-222.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.3
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
19
-
-
0029631990
-
The virtual filesystem interface in 4.4BSD
-
Winter
-
M. K. McKusick, "The Virtual Filesystem Interface in 4.4BSD," USENIX Computing Systems, Vol 8, Winter 1995, p. 3.
-
(1995)
USENIX Computing Systems
, vol.8
, pp. 3
-
-
McKusick, M.K.1
-
22
-
-
0024716226
-
Preserving and using context information in interprocess communication
-
Aug.
-
L.L. Peterson, N.C. Buchholz, R.D. Schlichting, "Preserving and Using Context Information in Interprocess Communication," ACM Transactions on Computer Systems, 7(3):217-246, Aug. 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 217-246
-
-
Peterson, L.L.1
Buchholz, N.C.2
Schlichting, R.D.3
-
23
-
-
85077758918
-
-
October 10
-
Secure Computing Corporation, Sidewinder Press Release, October 10, 1994.
-
(1994)
Sidewinder Press Release
-
-
-
24
-
-
84961694624
-
A TCB subset for integrity and role-based access control
-
Baltimore, MD
-
D. Sterne, "A TCB Subset for Integrity and Role-Based Access Control," Proc. 15th National Computer Security Conference, pages 680-696, Baltimore, MD, 1992.
-
(1992)
Proc. 15th National Computer Security Conference
, pp. 680-696
-
-
Sterne, D.1
-
25
-
-
0024663121
-
LOCK trek: Navigating uncharted space
-
Oakland, CA
-
O.S. Saydjari, J.M. Beckman, and J.R. Leaman, "LOCK Trek: Navigating Uncharted Space," Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, CA, p. 167, 1989.
-
(1989)
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 167
-
-
Saydjari, O.S.1
Beckman, J.M.2
Leaman, J.R.3
|