-
1
-
-
0030419725
-
A domain and type enforcement UnIX prototype
-
Cambridge, MA
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker. “A Domain and Type Enforcement UNIX Prototype,”USENIX Computing Systems Volume 9, Cambridge, MA, 1996.
-
(1996)
USENIX Computing Systems
, vol.9
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
-
2
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
May
-
R. W. Baldwin, “Naming and Grouping Privileges to Simplify Security Management in Large Databases”, Proceedings of the IEEE Symposium on Security and Privacy, page 116 (May 1990).
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 116
-
-
Baldwin, R.W.1
-
4
-
-
0003468990
-
-
Chapter 15, Security Service Specification, November Object Management Group, Inc
-
CORBA Services: Common Object Services Specification, Chapter 15, Security Service Specification, November 1997 Object Management Group, Inc.
-
(1997)
CORBA Services: Common Object Services Specification
-
-
-
5
-
-
0029222449
-
Integrating security in corba-based object architectures
-
R. H. Deng, S. K. Bohnsle, W. Wang, A. A. Lazar, “Integrating Security in CORBA-Based Object Architectures”, 1995 IEEE Symposium on Security and Privacy, page 50.
-
1995 IEEE Symposium on Security and Privacy
, pp. 50
-
-
Deng, R.H.1
Bohnsle, S.K.2
Wang, W.3
Lazar, A.A.4
-
6
-
-
84937399920
-
Issues in discretionary access control
-
D. Downs, J. Rub, K. Kung, C. Jordan, “Issues in Discretionary Access Control”, 1985 IEEE Proceedings of the Symposium on Security and Privacy, page 208.
-
(1985)
IEEE Proceedings of the Symposium on Security and Privacy
, pp. 208
-
-
Downs, D.1
Rub, J.2
Kung, K.3
Jordan, C.4
-
8
-
-
0004035649
-
-
Internet Engineering Task Force, RFC 2246, January
-
T. Dierks, C. Allen, The TLS Protocol Version 1.0, Internet Engineering Task Force, RFC 2246, January, 1999.
-
(1999)
The TLS Protocol Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
9
-
-
0141902726
-
Role-based access control for the world wide web
-
D. Kuhn, J. Barkley, A. Cincotta, D. Ferraiolo, S. Gavrila, “Role-Based Access Control for the World Wide Web”, 20th National Information Systems Security Conference, page 331.
-
20th National Information Systems Security Conference
, pp. 331
-
-
Kuhn, D.1
Barkley, J.2
Cincotta, A.3
Ferraiolo, D.4
Gavrila, S.5
-
11
-
-
85077746970
-
-
Orbix Security Guide
-
Orbix Security Guide, 1991, IONA Technologies PLC.
-
(1991)
IONA Technologies PLC
-
-
-
12
-
-
85077739704
-
-
Sun Microsystems, Palo Alto CA
-
Java RMI Security Extension, Early Look Draft, Sun Microsystems, Palo Alto CA, 1999 http://java.sun.com/products/jdk/rmi/rmi-security.pdf
-
(1999)
Java RMI Security Extension, Early Look Draft
-
-
-
13
-
-
0016555241
-
The protection of information in computer systems
-
March
-
J. Saltzer and M. Schroeder, “The Protection of Information in Computer Systems”, IEEE Proceedings, 63(9), March 1975.
-
(1975)
IEEE Proceedings
, vol.63
, Issue.9
-
-
Saltzer, J.1
Schroeder, M.2
-
17
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
San Jose, CA
-
th USENIX Security Symposium, San Jose, CA, 1996.
-
(1996)
th USENIX Security Symposium
-
-
Walker, K.W.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Sherman, D.L.5
Oostendorp, K.A.6
|