Access Control: The Neglected Frontier
暂无分享,去创建一个
[1] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[2] Mary Ellen Zurko,et al. A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[4] Ravi S. Sandhu,et al. On testing for absence of rights in access control models , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[5] Simon N. Foley,et al. Aggregation and Separation as Noninterference Properties , 1992, J. Comput. Secur..
[6] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[7] Ronald Fagin,et al. On an authorization mechanism , 1978, TODS.
[8] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[9] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[10] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[11] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[12] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[13] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[14] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[15] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[16] Ravi S. Sandhu. Expressive Power of the Schematic Protection Model , 1992, J. Comput. Secur..
[17] Morris Sloman,et al. The source of authority for commercial access control , 1988, Computer.
[18] Steven B. Lipner,et al. Non-Discretionery Controls for Commercial Applications , 1982, 1982 IEEE Symposium on Security and Privacy.
[19] Ravi S. Sandhu. Mandatory Controls for Database Integrity , 1989, DBSec.
[20] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.
[21] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[22] Ravi S. Sandhu,et al. The Extended Schematic Protection Model , 1992, J. Comput. Secur..
[23] Theodore M. P. Lee,et al. Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[24] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[25] Teresa F. Lunt. Access control policies: Some unanswered questions , 1989, Comput. Secur..
[26] Ravi S. Sandhu,et al. Conceptual foundations for a model of task-based authorizations , 1994, Proceedings The Computer Security Foundations Workshop VII.
[27] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[28] Ravi Sandhu,et al. Expressive power of access control models based on propagation of rights , 1996 .
[29] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[30] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[31] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.