1 |
D. F. Ferraiolo, D. Richard Kuhn, "Role-Based Access Controls", Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland, October, 13-16, 1992
|
2 |
M. Massie, B. Chun, and D. Culler, "The Ganglia Distributed Monitoring System: Design, Impleementation and Experience," Paralled Computing. Vol.30, Issue. 7, 2004
|
3 |
W. Yurcik, X. Meng, and N. Kiyanclar, " NVisionCC: a Visualization Framework for High Performance Cluster Security," Proc. of VizSEC 2004, ACM Press, New York, NY, USA, Oct. 2004. pp. 133-137
|
4 |
http://www.symantec.co.kr
|
5 |
D.E. DENNING, "A lattice model of secure information flow", Commun, ACM 19, 2, 236-243. 1976
DOI
ScienceOn
|
6 |
T. Roney, A. Bailey, and J, Fullop, "Cluster Monitoring at NCS," 2nd LCI Int'l Conf. on Linux Clusters.2001
|
7 |
R. SANDHU, P.SAMARATI, "Access control: Principles and practice", IEEE Commun. Mag.32, 9, 40-48 1994
|
8 |
http://iase.disa.mil/stigs/SRR/index.html
|