Providing flexibility in information flow control for object oriented systems
暂无分享,去创建一个
Elisa Bertino | Sushil Jajodia | Pierangela Samarati | Elena Ferrari | P. Samarati | S. Jajodia | E. Bertino | E. Ferrari
[1] Sushil Jajodia,et al. Integrating an object-oriented data model with multilevel security , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] K. G. Walter,et al. Primitive Models for Computer Security , 1974 .
[3] Paul A. Karger,et al. Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.
[4] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[5] Elisa Bertino,et al. Information Flow Control in Object-Oriented Systems , 1997, IEEE Trans. Knowl. Data Eng..
[6] Chris Sivula,et al. Reynolds and Reynolds Co. , 1993 .
[7] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] A. L. Wilkinson,et al. A penetration analysis of a Burroughs Large System , 1981, OPSR.
[9] Alley Stoughton. Access Flow: A Protection Model which Integrates Access Control and Information Flow , 1981, 1981 IEEE Symposium on Security and Privacy.