메뉴 건너뛰기




Volumn , Issue , 1998, Pages

A comparison of methods for implementing adaptive security policies

Author keywords

[No Author keywords available]

Indexed keywords

CONCURRENCY CONTROL; SECURITY OF DATA;

EID: 85084164023     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (15)
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The MITRE Corporation, May
    • D. Elliott Bell and Leonard J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, May 1973.
    • (1973) Technical Report M74-244
    • Elliott Bell, D.1    La Padula, L.J.2
  • 4
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, April
    • David D. Clark and David R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 9
    • 85033154701 scopus 로고
    • Open Software Foundation and Carnegie Mellon University, May
    • Keith Loepere. OSF Mach Kernel Principles. Open Software Foundation and Carnegie Mellon University, May 1993.
    • (1993) OSF Mach Kernel Principles
    • Loepere, K.1
  • 10
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a Mach based system
    • June
    • Spencer E. Minear. Providing policy control over object operations in a Mach based system. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.
    • (1995) Proceedings of the Fifth USENIX UNIX Security Symposium , pp. 141-156
    • Minear, S.E.1
  • 11
    • 0004198635 scopus 로고    scopus 로고
    • Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition
    • Charles P. Pfleeger. Security in Computing. Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition, 1997.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 12
    • 85026780978 scopus 로고
    • Mach: A case study in technology transfer
    • Richard F. Rashid, editor chapter 17 ACM Press
    • Richard F. Rashid. Mach: A case study in technology transfer. In Richard F. Rashid, editor, CMU Computer Science: A 25th Anniversary Commemorative, chapter 17, pages 411-421. ACM Press, 1991.
    • (1991) CMU Computer Science: A 25th Anniversary Commemorative , pp. 411-421
    • Rashid, R.F.1
  • 13
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • Ravi S. Sandhu and Edward J. Coyne. Role-based access control models. IEEE Computer, pages 38-47, February 1996.
    • (1996) IEEE Computer , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2
  • 14
    • 85077777634 scopus 로고    scopus 로고
    • DTOS generalized security policy specification
    • Roseville, Minnesota 55113-2536, June
    • Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, June 1997.
    • (1997) DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road
  • 15
    • 2342548986 scopus 로고    scopus 로고
    • Experimentation with adaptive security policies
    • Roseville, Minnesota 55113-2536, January Final Report for Rome Laboratory contract F30602-95-C-0047
    • Edward A. Schneider, William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with adaptive security policies. Technical report, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, January 1996. Final Report for Rome Laboratory contract F30602-95-C-0047.
    • (1996) Technical Report, Secure Computing Corporation, 2675 Long Lake Road
    • Schneider, E.A.1    Kalsow, W.2    Tewinkel, L.3    Carney, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.