1 |
David F. Ferraiolo, Ravi Sandu and Serban Gavrila, 'A Proposed Standard for Role-Based Access Control,' ACM transaction on Information and System Security, Vol.4, No.3, pp.224-274, Aug., 2001, http://csrc.nist.gov/rbac/
DOI
|
2 |
J. G. Ko, J. N. Kim and K. I. Jeong, 'Access Control for Secure FreeBSD Operating System,' Proc. of WISA2001, The Second International Workshop on Information Secu-rity Applications, 2001
|
3 |
Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muc-kelbauer, Ruth C. Taylor, S. Jeff Truner, John F. Farrel, 'The Inevitablity of Failure : The Flawed Assumption of Security in Modern Computing Environments,' National Security Agency, 1997
|
4 |
Bell, David Elliott and Leonard J. La Padula, 'Secure computer system : Unified exposition and multics inter-pretation,' MITRE Technical Report 2997, MITRE Corp, Bedford, MA, 1975
|
5 |
UNICOS Multilevel Security (MLS) Features Users Guide, SG-21111 10.0, http://rcs21.urz.tu-dresden.de:80/ebt-bin/nph-dweb/dyna web./@Generic_BookTextVie
|
6 |
http://www.hpcc.gov/pubs/blue97/nsa/secureos.html
|
7 |
http://www.cs.utah.edu/flux/fluke/html/linux.html
|
8 |
DOD 5200.28-STD, 'Department of Defense Trusted Com-puter System Evaluation Criteria,' December, 1985
|
9 |
D. Ferraolo and R, Kuhn, 'Role-Based Access Control,' Proceeding of the 15th National Computer Security Conference, 1992
|
10 |
R. Graubart, 'Operating System Support for Trusted Ap-plications,' Proceedings of the 15th National Computer Security Conference, 1992
|
11 |
M. Harrison et al., 'Protection in Operating Systems,' Communications of ACM 19(8), August, 1976
DOI
ScienceOn
|
12 |
Secure Computing Corporation, 'Assurance in the Fluke Microkernel : Formal Security Policy Model,' Technical report MD A904-97-C-3047 CDRL A003, March, 1998
|
13 |
FreeBSD 4.3-RELEASE Source Code
|
14 |
Roos Lindgreen, Herschberg I. S., 'On the Validity of the Bell-Lapadula Model,' Computer & Security, Vol.13, pp. 317-338, 1994
DOI
ScienceOn
|