Applying the Take-Grant Protection Model
暂无分享,去创建一个
[1] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[2] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[3] Ken Thompson,et al. The UNIX time-sharing system , 1974, CACM.
[4] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[5] A. Retrospective,et al. The UNIX Time-sharing System , 1977 .
[6] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[7] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[8] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[9] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[10] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[11] David Jefferson,et al. Protection in the Hydra Operating System , 1975, SOSP.
[12] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[13] Lawrence Snyder. On the synthesis and analysis of protection systems , 1977, SOSP '77.
[14] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[15] Margaret S. Wu,et al. Hierarchical Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.
[16] Lawrence Snyder. Theft and Conspiracy in the Take-Grant Protection Model , 1981, J. Comput. Syst. Sci..
[17] Matt Bishop. Hierarchical Take-Grant Protection systems , 1981, SOSP.