1 |
David F. Ferraiolo, Ravi Sandu & Serban Gavrila, 'A Proposed Standard for Role-Based Access Control,' ACM transaction on Information and System Security, Vol.4, No.3, pp.224-274, Aug., 2001
DOI
|
2 |
'Common Criteria for Information Technology Security Evaluation, Part 2 : Security functional requirements,' Version 2.1, 1999
|
3 |
M. Blaze, 'A Cryptographic File System for Unix,' Proc. of the first ACM Conference on Computer and Communications Security, Fairfax, VA, Nov., 1993
|
4 |
G. Cattaneo & G. Persiano, 'Design and Implementation of a Transparent Cryptographic File System for Unix,' Unpublished Technical Report. Dip. Informatica ed Appl, Universita di Salerno, July, 1997
|
5 |
E. Zadok, I. Badulescu & A. Shender, 'Cryptfs : A Stackable Vnode Level Encryption File System,' Technical Report CUCS-021-98, Computer Science Department, Columbia University, July, 1998
|
6 |
Andrew D. McDonald & Markus G. Kuhn, 'StegFS : A Steganographic File System for Linux,' IH '99 LNCS 1768, pp.463-477, 2000
|
7 |
J. G. Ko, J. N. Kim & K. I. Jeong, 'Access Control for Secure FreeBSD Operating System,' Proc. of WISA2001, The Second International Workshop on Information Security Applications, Seoul, KOREA, pp.247-254, Sep., 2001
|
8 |
Bell, David Elliott & Leonard J. La Padula, 'Secure computer system: Unified exposition and multics interpretation,' MITRE Technical Report 2997, MITRE Corp, Bedford, MA, 1975
|
9 |
B. Schneier, 'Algorithm Types and Modes: In Applied Cryptography,' 2nd Ed. John Wiley & Sons, pp.189-197, 1996
|
10 |
B. Schneier, 'Blowfish: In Applied Cryptography,' 2nd Ed., John Wiley & Sons, pp.336-339, 1996
|