-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The MITRE Corporation, May
-
D. Elliott Bell and Leonard J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, May 1973.
-
(1973)
Technical Report M74-244
-
-
Elliott Bell, D.1
La Padula, L.J.2
-
4
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, April
-
David D. Clark and David R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
5
-
-
0002262722
-
Role-based access control (rbac): Features and motivations
-
New Orleans, LA, dec
-
David F. Ferraiolo, Janet A. Cugini, and D. Richard Kuhn. Role-based access control (rbac): Features and motivations. In Computer Security Applications Conference, New Orleans, LA, dec 1995.
-
(1995)
Computer Security Applications Conference
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Richard Kuhn, D.3
-
9
-
-
85033154701
-
-
Open Software Foundation and Carnegie Mellon University, May
-
Keith Loepere. OSF Mach Kernel Principles. Open Software Foundation and Carnegie Mellon University, May 1993.
-
(1993)
OSF Mach Kernel Principles
-
-
Loepere, K.1
-
10
-
-
85084163247
-
Providing policy control over object operations in a Mach based system
-
June
-
Spencer E. Minear. Providing policy control over object operations in a Mach based system. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
, pp. 141-156
-
-
Minear, S.E.1
-
11
-
-
0004198635
-
-
Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition
-
Charles P. Pfleeger. Security in Computing. Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition, 1997.
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
12
-
-
85026780978
-
Mach: A case study in technology transfer
-
Richard F. Rashid, editor chapter 17 ACM Press
-
Richard F. Rashid. Mach: A case study in technology transfer. In Richard F. Rashid, editor, CMU Computer Science: A 25th Anniversary Commemorative, chapter 17, pages 411-421. ACM Press, 1991.
-
(1991)
CMU Computer Science: A 25th Anniversary Commemorative
, pp. 411-421
-
-
Rashid, R.F.1
-
13
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi S. Sandhu and Edward J. Coyne. Role-based access control models. IEEE Computer, pages 38-47, February 1996.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
14
-
-
85077777634
-
DTOS generalized security policy specification
-
Roseville, Minnesota 55113-2536, June
-
Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, June 1997.
-
(1997)
DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road
-
-
-
15
-
-
2342548986
-
Experimentation with adaptive security policies
-
Roseville, Minnesota 55113-2536, January Final Report for Rome Laboratory contract F30602-95-C-0047
-
Edward A. Schneider, William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with adaptive security policies. Technical report, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, January 1996. Final Report for Rome Laboratory contract F30602-95-C-0047.
-
(1996)
Technical Report, Secure Computing Corporation, 2675 Long Lake Road
-
-
Schneider, E.A.1
Kalsow, W.2
Tewinkel, L.3
Carney, M.4
|