Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
暂无分享,去创建一个
Claudia Keser | Pau-Chen Cheng | Pankaj Rohatgi | Paul A. Karger | Grant M. Wagner | Angela Schuett Reninger
[1] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] Anton Riabov,et al. Planning for Stream Processing Systems , 2005, AAAI.
[3] Paul A. Karger,et al. Multi-level security requirements for hypervisors , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] B. D. GOLD,et al. A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Axel Schairer,et al. Verification of a Formal Security Model for Multiapplicative Smart Cards , 2000, ESORICS.
[6] E. Mizutani,et al. Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review] , 1997, IEEE Transactions on Automatic Control.
[7] S. Sunder. Experimental Asset Markets: A Survey , 1992 .
[8] Axel Schairer,et al. Verified Formal Security Models for Multiapplicative Smart Cards , 2002, J. Comput. Secur..
[9] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[10] Anton Riabov,et al. Scalable Planning for Distributed Stream Processing Systems , 2006, ICAPS.
[11] Chuen-Tsai Sun,et al. Neuro-fuzzy And Soft Computing: A Computational Approach To Learning And Machine Intelligence [Books in Brief] , 1997, IEEE Transactions on Neural Networks.
[12] Vernon L. Smith,et al. Papers in Experimental Economics: Markets as Economizers of Information: Experimental Examination of the “Hayek Hypothesis” , 1991 .
[13] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[14] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[15] David Ingram,et al. Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.
[16] Sue Ammen,et al. Race and correctional officers' punitive attitudes toward treatment programs for inmates , 1996 .
[17] Fan Ye,et al. Multi-site cooperative data stream analysis , 2006, OPSR.
[18] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[19] Etienne J. Khayat,et al. Risk Based Security Analysis of Permissions in RBAC , 2004, WOSIS.
[20] Claudio Bartolini,et al. Market-Based Resource Allocation for Utility Data Centers , 2003 .
[21] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[22] D. F. Stork. Downgrading in a Secure Multilevel Computer System: The Formulary Concept , 1975 .
[23] D. MacKenzie,et al. The use of knowledge about society , 2008 .
[24] Navendu Jain,et al. Adaptive Control of Extreme-scale Stream Processing Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[25] Roger R. Schell,et al. Designing the GEMSOS security kernel for security and performance , 1985 .