Next: About this document
Up: A Comparison of Methods
Previous: Acknowledgments
References
- BK85
-
W.E. Boebert and R.Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the 8th National Computer Security
Conference, September 1985.
- BL73
-
D. Elliott Bell and Leonard J. La Padula.
Secure computer systems: Mathematical foundations and model.
Technical Report M74-244, The MITRE Corporation, May 1973.
- BN89
-
David F. C. Brewer and Michael J. Nash.
The Chinese wall security policy.
In IEEE Symposium on Security and Privacy, pages 206-214,
Oakland, CA, May 1989.
- CW87
-
David D. Clark and David R. Wilson.
A comparison of commercial and military computer security policies.
In IEEE Symposium on Security and Privacy, pages 184-194,
Oakland, CA, April 1987.
- FCK95
-
David F. Ferraiolo, Janet A. Cugini, and D. Richard Kuhn.
Role-based access control (rbac): Features and motivations.
In Computer Security Applications Conference, New Orleans, LA,
dec 1995.
- FM93
-
Todd Fine and Spencer E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in
Security and Privacy, pages 206-218, May 1993.
- GHS97
-
Paula Greve, John Hoffman, and Richard Smith.
Using Type Enforcement to Assure a Configurable Guard.
In Proceedings of the 13th Annual Computer Security
Applications Conference, 1997.
To appear.
- Hof97
-
John Hoffman.
Implementing RBAC on a Type Enforced System.
In Proceedings of the 13th Annual Computer Security
Applications Conference, 1997.
To appear.
- Loe93
-
Keith Loepere.
OSF Mach Kernel Principles.
Open Software Foundation and Carnegie Mellon University, May 1993.
- Min95
-
Spencer E. Minear.
Providing policy control over object operations in a Mach based
system.
In Proceedings of the Fifth USENIX UNIX Security Symposium,
pages 141-156, June 1995.
- Pfl97
-
Charles P. Pfleeger.
Security in Computing.
Prentice Hall, Inc., Upper Saddle River, NJ, 2 edition, 1997.
- Ras91
-
Richard F. Rashid.
Mach: A case study in technology transfer.
In Richard F. Rashid, editor, CMU Computer Science: A 25th
Anniversary Commemorative, chapter 17, pages 411-421. ACM Press, 1991.
- SC96
-
Ravi S. Sandhu and Edward J. Coyne.
Role-based access control models.
IEEE Computer, pages 38-47, February 1996.
- Sec97
-
Secure Computing Corporation.
DTOS Generalized Security Policy Specification.
DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road,
Roseville, Minnesota 55113-2536, June 1997.
- SKTC96
-
Edward A. Schneider, William Kalsow, Lynn TeWinkel, and Michael Carney.
Experimentation with adaptive security policies.
Technical report, Secure Computing Corporation, 2675 Long Lake Road,
Roseville, Minnesota 55113-2536, January 1996.
Final Report for Rome Laboratory contract F30602-95-C-0047.
Brian Loe
Tue Dec 9 09:16:53 CST 1997