Check out the new USENIX Web site.

next up previous
Next: About this document Up: A Comparison of Methods Previous: Acknowledgments

References

BK85
W.E. Boebert and R.Y. Kain. A Practical Alternative to Hierarchical Integrity Policies. In Proceedings of the 8th National Computer Security Conference, September 1985.

BL73
D. Elliott Bell and Leonard J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, May 1973.

BN89
David F. C. Brewer and Michael J. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, pages 206-214, Oakland, CA, May 1989.

CW87
David D. Clark and David R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.

FCK95
David F. Ferraiolo, Janet A. Cugini, and D. Richard Kuhn. Role-based access control (rbac): Features and motivations. In Computer Security Applications Conference, New Orleans, LA, dec 1995.

FM93
Todd Fine and Spencer E. Minear. Assuring Distributed Trusted Mach. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 206-218, May 1993.

GHS97
Paula Greve, John Hoffman, and Richard Smith. Using Type Enforcement to Assure a Configurable Guard. In Proceedings of the 13th Annual Computer Security Applications Conference, 1997. To appear.

Hof97
John Hoffman. Implementing RBAC on a Type Enforced System. In Proceedings of the 13th Annual Computer Security Applications Conference, 1997. To appear.

Loe93
Keith Loepere. OSF Mach Kernel Principles. Open Software Foundation and Carnegie Mellon University, May 1993.

Min95
Spencer E. Minear. Providing policy control over object operations in a Mach based system. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.

Pfl97
Charles P. Pfleeger. Security in Computing. Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition, 1997.

Ras91
Richard F. Rashid. Mach: A case study in technology transfer. In Richard F. Rashid, editor, CMU Computer Science: A 25th Anniversary Commemorative, chapter 17, pages 411-421. ACM Press, 1991.

SC96
Ravi S. Sandhu and Edward J. Coyne. Role-based access control models. IEEE Computer, pages 38-47, February 1996.

Sec97
Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, June 1997.

SKTC96
Edward A. Schneider, William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with adaptive security policies. Technical report, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, January 1996. Final Report for Rome Laboratory contract F30602-95-C-0047.



Brian Loe
Tue Dec 9 09:16:53 CST 1997