Looking back at the Bell-La Padula model
暂无分享,去创建一个
[1] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[2] K. G. Walter,et al. Primitive Models for Computer Security , 1974 .
[3] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[4] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[5] C. Weissman. BLACKER: security for the DDN examples of A1 security engineering trades , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] P. A. Karger,et al. Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[7] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[8] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[9] Paul A. Karger,et al. Thirty years later: lessons from the Multics security evaluation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[10] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[11] Theodore M. P. Lee,et al. Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[12] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[13] E. J. McCauley,et al. KSOS - The design of a secure operating system , 1899 .
[14] Clifford Stoll,et al. The Cuckoo's Egg , 1989 .
[15] K. Thompson. Reflections on trusting trust , 1984, CACM.
[16] Carrie Fisher. Postcards from the Edge , 1987 .
[17] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[18] Cynthia E. Irvine,et al. Subversion as a Threat in Information Warfare , 2004 .
[19] D. E. Bell,et al. A Software Validation Technique for Certification: The Methodology , 1975 .
[20] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[21] Marvin Schaefer,et al. Program confinement in KVM/370 , 1977, ACM '77.
[22] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[23] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[24] Mary Ellen Zurko,et al. A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.