Least-restrictive enforcement of the Chinese wall security policy
暂无分享,去创建一个
[1] Vijayalakshmi Atluri,et al. A Chinese wall security model for decentralized workflow systems , 2001, CCS '01.
[2] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[3] Lujo Bauer,et al. Run-Time Enforcement of Nonsafety Policies , 2009, TSEC.
[4] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[6] Philip W. L. Fong. Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] Dieter Gollmann. Computer Security (3. ed.) , 2011 .
[8] Volker Kessler. On the Chinese Wall Model , 1992, ESORICS.
[9] Mukesh Singhal,et al. Information flow control in cloud computing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[10] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[11] Michael Davis,et al. Conflict of Interest in the Professions , 2001 .
[12] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[13] Tsau Young Lin,et al. Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[14] Ravi Sandhu. A Lattice Interpretation Of The Chinese Wall Policy , 1992 .
[15] Stephen Warshall,et al. A Theorem on Boolean Matrices , 1962, JACM.
[16] Kuo-Sen Chou,et al. A practical Chinese wall security model in cloud computing , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.
[17] Ravi S. Sandhu. Lattice-based enforcement of Chinese Walls , 1992, Comput. Secur..
[18] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[19] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[20] Vipin Chaudhary,et al. History-based access control for mobile code , 1998, CCS '98.
[21] Jim Alves-Foss,et al. A Trace-Based Model of the Chinese Wall Security Policy , 1999 .
[22] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[23] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.