Controls for Interorganization Networks
暂无分享,去创建一个
[1] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[2] Deborah Estrin. Inter-organization networks: implications of access control: requirements for interconnection protocol , 1986, SIGCOMM '86.
[3] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[4] Leo Joseph Rotenberg,et al. Making computers keep secrets , 1973 .
[5] Deborah Estrin. Non-Discretionary Controls for Inter-Organization Networks , 1985, 1985 IEEE Symposium on Security and Privacy.
[6] Steven B. Lipner,et al. Non-Discretionery Controls for Commercial Applications , 1982, 1982 IEEE Symposium on Security and Privacy.
[7] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[8] P. A. Karger. NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS , 1977 .
[9] Deborah Estrin,et al. Access to inter-organization computer networks , 1986, COCS '86.