Advertisement

Keywords

Access Control IEEE Computer Society Security Policy Security Model Computer Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

2.9 References

  1. [1]
    “The Protection of Information in Computer Systems”, Jerome Saltzer and Michael Schroeder, Proceedings of the IEEE, Vol.63,No.9 (September 1975), p.1278.Google Scholar
  2. [2]
    “Object-Oriented Software Construction, Second Edition”, Bertrand Meyer, Prentice Hall, 1997.Google Scholar
  3. [3]
    “Assertion Definition Language (ADL) 2.0”, X/Open Group, November 1998.Google Scholar
  4. [4]
    “Security in Computing”, Charles Pfleeger, Prentice-Hall, 1989.Google Scholar
  5. [5]
    “Why does Trusted Computing Cost so Much”, Susan Heath, Phillip Swanson, and Daniel Gambel, Proceedings of the 14thNational Computer Security Conference, October 1991, p.644. Republished in the Proceedings of the 4thAnnual Canadian Computer Security Symposium, May 1992, p.71.Google Scholar
  6. [6]
    “Protection”, Butler Lampson, Proceedings of the 5thPrinceton Symposium on Information Sciences and Systems, Princeton, 1971, p.437.Google Scholar
  7. [7]
    “Issues in Discretionary Access Control”, Deborah Downs, Jerzy Rub, Kenneth Kung, and Carole Joran, Proceedings of the 1985 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1985, p.208.Google Scholar
  8. [8]
    “A lattice model of secure information flow”, Dorothy Denning, Communications of the ACM, Vol.19.No.5 (May 1976), p.236.CrossRefzbMATHMathSciNetGoogle Scholar
  9. [9]
    “Improving Security and Performance for Capability Systems”, Paul Karger, PhD Thesis, University of Cambridge, October 1988.Google Scholar
  10. [10]
    “A Secure Identity-Based Capability System”, Li Gong, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.56.Google Scholar
  11. [11]
    “Mechanisms for Persistence and Security in BirliX”, W. Kühnhauser, H. Härtig, O. Kowalski, and W. Lux, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.309.Google Scholar
  12. [12]
    “Access Control by Boolean Expression Evaluation”, Donald Miller and Robert Baldwin, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.131.Google Scholar
  13. [13]
    “An Analysis of Access Control Models”, Gregory Saunders, Michael Hitchens, and Vijay Varadharajan, Proceedings of the Fourth Australasian Conference on Information Security and Privacy (ACISP’99), Springer-Verlag Lecture Notes in Computer Science, No.1587, April 1999, p.281.Google Scholar
  14. [14]
    “Designing the GEMSOS Security Kernel for Security and Performance”, Roger Schell, Tien Tao, and Mark Heckman, Proceedings of the 8thNational Computer Security Conference, September 1985, p.108.Google Scholar
  15. [15]
    “Secure Computer Systems: Mathematical Foundations and Model”, D.Elliott Bell and Leonard LaPadula, M74-244, MITRE Corporation, 1973.Google Scholar
  16. [16]
    “Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the US Military”, Donald MacKenzie and Garrel Pottinger, IEEE Annals of the History of Computing, Vol.19,No.3 (July–September 1997), p.41.CrossRefGoogle Scholar
  17. [17]
    “Secure Computing: The Secure Ada Target Approach”, W. Boebert, R. Kain, and W. Young, Scientific Honeyweller, Vol.6,No.2 (July 1985).Google Scholar
  18. [18]
    “A Note on the Confinement Problem”, Butler Lampson, Communications of the ACM, Vol.16,No.10 (October 1973), p.613.CrossRefGoogle Scholar
  19. [19]
    “Trusted Computer Systems Evaluation Criteria”, DOD 5200.28-STD, US Department of Defence, December 1985.Google Scholar
  20. [20]
    “Trusted Products Evaluation”, Santosh Chokhani, Communications of the ACM, Vol.35,No.7 (July 1992), p.64.CrossRefGoogle Scholar
  21. [21]
    “NOT the Orange Book: A Guide to the Definition, Specification, and Documentation of Secure Computer Systems”, Paul Merrill, Merlyn Press, Wright-Patterson Air Force Base, 1992.Google Scholar
  22. [22]
    “Evaluation Criteria for Trusted Systems”, Roger Schell and Donald Brinkles, “Information Security: An Integrated Collection of Essays”, IEEE Computer Society Press, 1995, p.137.Google Scholar
  23. [23]
    “Integrity Considerations for Secure Computer Systems”, Kenneth Biba, ESD-TR-76-372, USAF Electronic Systems Division, April 1977.Google Scholar
  24. [24]
    “Fundamentals of Computer Security Technology”, Edward Amoroso, Prentice-Hall, 1994.Google Scholar
  25. [25]
    “Operating System Integrity”, Greg O’Shea, Computers and Security, Vol.10,No.5 (August 1991), p.443.Google Scholar
  26. [26]
    “Risk Analysis of ‘Trusted Computer Systems’”, Klaus Brunnstein and Simone Fischer-Hübner, Computer Security and Information Integrity, Elsevier Science Publishers, 1991, p.71.Google Scholar
  27. [27]
    “A Comparison of Commercial and Military Computer Security Policies”, David Clark and David Wilson, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, p.184.Google Scholar
  28. [28]
    “Transaction Processing: Concepts and Techniques” Jim Gray and Andreas Reuter, Morgan Kaufmann, 1993.Google Scholar
  29. [29]
    “Atomic Transactions”, Nancy Lynch, Michael Merritt, William Weihl, and Alan Fekete, Morgan Kaufmann, 1994.Google Scholar
  30. [30]
    “Principles of Transaction Processing”, Philip Bernstein and Eric Newcomer, Morgan Kaufman Series in Data Management Systems, January 1997.Google Scholar
  31. [31]
    “Non-discretionary controls for commercial applications”, Steven Lipner, Proceedings of the 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, p.2.Google Scholar
  32. [32]
    “Putting Policy Commonalities to Work”, D.Elliott Bell, Proceedings of the 14thNational Computer Security Conference, October 1991, p.456.Google Scholar
  33. [33]
    “Modeling Mandatory Access Control in Role-based Security Systems”, Matunda Nyanchama and Sylvia Osborn, Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security (Database Security IX), Chapman & Hall, August 1995, p.129.Google Scholar
  34. [34]
    “Role Activation Hierarchies”, Ravi Sandhu, Proceedings of the 3rdACM Workshop on Role-Based Access Control (RBAC’98), October 1998, p.33.Google Scholar
  35. [35]
    “The Chinese Wall Security Policy”, David Brewer and Michael Nash, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.206.Google Scholar
  36. [36]
    “Chinese Wall Security Policy — An Aggressive Model”, T. Lin, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.282.Google Scholar
  37. [37]
    “A lattice interpretation of the Chinese Wall policy”, Ravi Sandhu, Proceedings of the 15thNational Computer Security Conference, October 1992, p.329.Google Scholar
  38. [38]
    “Lattice-Based Enforcement of Chinese Walls”, Ravi Sandhu, Computers and Security, Vol.11,No.8 (December 1992), p.753.CrossRefGoogle Scholar
  39. [39]
    “On the Chinese Wall Model”, Volker Kessler, Proceedings of the European Symposium on Resarch in Computer Security (ESORICS’92), Springer-Verlag Lecture Notes in Computer Science, No.648, November 1992, p.41.Google Scholar
  40. [40]
    “A Retrospective on the Criteria Movement”, Willis Ware, Proceedings of the 18thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1995, p.582.Google Scholar
  41. [41]
    “Certification of programs for secure information flow”, Dorothy Denning, Communications of the ACM, Vol.20,No.6 (June 1977), p.504.zbMATHGoogle Scholar
  42. [42]
    “Computer Security: A User’s Perspective”, Lenora Haldenby, Proceedings of the 2ndAnnual Canadian Computer Security Conference, March 1990, p.63.Google Scholar
  43. [43]
    “Some Extensions to the Lattice Model for Computer Security”, Jie Wu, Eduardo Fernandez, and Ruigang Zhang, Computers and Security, Vol.11,No.4 (July 1992), p.357.CrossRefGoogle Scholar
  44. [44]
    “Exploiting the Dual Nature of Sensitivity Labels”, John Woodward, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, p.23.Google Scholar
  45. [45]
    “A Multilevel Security Model for Distributed Object Systems”, Vincent Nicomette and Yves Deswarte, Proceedings of the 4thEuropean Symposium on Research in Computer Security (ESORICS’96), Springer-Verlag Lecture Notes in Computer Science, No.1146, September 1996, p.80.Google Scholar
  46. [46]
    “Security Kernels: A Solution or a Problem”, Stanley Ames Jr., Proceedings of the 1981 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1981, p.141.Google Scholar
  47. [47]
    “A Security Model for Military Message Systems”, Carl Landwehr, Constance Heitmeyer, and John McLean, ACM Transactions on Computer Systems, Vol.2,No.3 (August 1984), p.198.CrossRefGoogle Scholar
  48. [48]
    “A Security Model for Military Message Systems: Restrospective”, Carl Landwehr, Constance Heitmeyer, and John McLean, Proceedings of the 17thAnnual Computer Security Applications Conference (ACSAC’01), December 2001, p.174.Google Scholar
  49. [49]
    “Development of a Multi Level Data Generation Application for GEMSOS”, E. Schallenmuller, R. Cramer, and B. Aldridge, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.86.Google Scholar
  50. [50]
    “A Security Model for Military Message Systems”, Carl Landwehr, Constance Heitmeyer, and John McLean, ACM Transactions on Computer Systems, Vol.2,No.3 (August 1984), p.198.CrossRefGoogle Scholar
  51. [51]
    “Formal Models for Computer Security”, Carl Landwehr, ACM Computing Surveys, Vol. 13,No. 3 (September 1981), p.247CrossRefGoogle Scholar
  52. [52]
    “A Taxonomy of Integrity Models, Implementations, and Mechanisms”, J.Eric Roskos, Stephen Welke, John Boone, and Terry Mayfield, Proceedings of the 13thNational Computer Security Conference, October 1990, p.541.Google Scholar
  53. [53]
    “An Analysis of Application Specific Security Policies” Daniel Sterne, Martha Branstad, Brian Hubbard, Barbara Mayer, and Dawn Wolcott, Proceedings of the 14thNational Computer Security Conference, October 1991, p.25.Google Scholar
  54. [54]
    “Is there a need for new information security models?”, S.A. Kokolakis, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security (Communications and Security II), Chapman & Hall, 1996, p.256.Google Scholar
  55. [55]
    “The Multipolicy Paradigm for Trusted Systems”, Hilary Hosmer, Proceedings of the 1992 New Security Paradigms Workshop, ACM, 1992, p.19.Google Scholar
  56. [56]
    “Metapolicies II”, Hilary Hosmer, Proceedings of the 15thNational Computer Security Conference, October 1992, p.369.Google Scholar
  57. [57]
    “Security Kernel Design and Implementation: An Introduction”, Stanley Ames Jr, Morrie Gasser, and Roger Schell, IEEE Computer, Vol.16,No.7 (July 1983), p.14.Google Scholar
  58. [58]
    “Kernels for Safety?”, John Rushby, Safe and Secure Computing Systems, Blackwell Scientific Publications, 1989, p.210.Google Scholar
  59. [59]
    “Security policies and security models”, Joseph Goguen and José Meseguer, Proceedings of the 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, p.11.Google Scholar
  60. [60]
    “The Architecture of Complexity”, Herbert Simon, Proceedings of the American Philosophical Society, Vol.106,No.6 (December 1962), p.467.Google Scholar
  61. [61]
    “Design and Verification of Secure Systems”, John Rushby, ACM Operating Systems Review, Vol.15,No.5 (December 1981), p.12.Google Scholar
  62. [62]
    “Developing Secure Systems in a Modular Way”, Qi Shi, J. McDermid, and J. Moffett, Proceedings of the 8thAnnual Conference on Computer Assurance (COMPASS’93), IEEE Computer Society Press, 1993, p.111.Google Scholar
  63. [63]
    “A Separation Model for Virtual Machine Monitors”, Nancy Kelem and Richard Feiertag, Proceedings of the 1991 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1991, p.78.Google Scholar
  64. [64]
    “A Retrospective on the VAX VMM Security Kernel”, Paul Karger, Mary Ellen Zurko, Douglas Bonin, Andrew Mason, and Clifford Kahn, IEEE Transactions on Software Engineering, Vol.17,No.11 (November 1991), p1147.CrossRefGoogle Scholar
  65. [65]
    “Separation Machines”, Jon Graff, Proceedings of the 15thNational Computer Security Conference, October 1992, p.631.Google Scholar
  66. [66]
    “Proof of Separability: A Verification Technique for a Class of Security Kernels”, John Rushby, Proceedings of the 5thSymposium on Programming, Springer-Verlag Lecture Notes in Computer Science, No.137, August 1982.Google Scholar
  67. [67]
    “A Comment on the ‘Basic Security Theorem’ of Bell and LaPadula”, John McLean, Information Processing Letters, Vol.20,No.2 (15 February 1985), p.67.CrossRefMathSciNetGoogle Scholar
  68. [68]
    “On the validity of the Bell-LaPadula model”, E.Roos Lindgren and I. Herschberg, Computers and Security, Vol.13,No.4 (1994), p.317.Google Scholar
  69. [69]
    “New Thinking About Information Technology Security”, Marshall Abrams and Michael Joyce, Computers and Security, Vol.14,No.1 (January 1995), p.57.Google Scholar
  70. [70]
    “A Provably Secure Operating System: The System, Its Applications, and Proofs”, Peter Neumann, Robert Boyer, Richard Feiertag, Karl Levitt, and Lawrence Robinson, SRI Computer Science Laboratory report CSL 116, SRI International, May 1980.Google Scholar
  71. [71]
    “Locking Computers Securely”, O.Sami Saydari, Joseph Beckman, and Jeffrey Leaman, Proceedings of the 10thAnnual Computer Security Conference, 1987, p.129.Google Scholar
  72. [72]
    “Constructing an Infosec System Using the LOCK Technology”, W.Earl Boebert, Proceedings of the 8thNational Computer Security Conference, October 1988, p.89.Google Scholar
  73. [73]
    “M2S: A Machine for Multilevel Security”, Bruno d’Ausbourg and Jean-Henri Llareus, Proceedings of the European Symposium on Research in Computer Security (ESORICS’92), Springer-Verlag Lecture Notes in Computer Science, No.648, November 1992, p.373.Google Scholar
  74. [74]
    “MUTABOR, A Coprocessor Supporting Memory Management in an Object-Oriented Architecture”, Jörg Kaiser, IEEE Micro, Vol.8,No.5 (September/October 1988), p.30.CrossRefGoogle Scholar
  75. [75]
    “An Object-Oriented Approach to Support System Reliability and Security”, Jörg Kaiser, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.173.Google Scholar
  76. [76]
    “Active Memory for Managing Persistent Objects”, S. Lavington and R. Davies, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.137.Google Scholar
  77. [77]
    “Programming a VIPER”, T. Buckley, P. Jesty, Proceedings of the 4thAnnual Conference on Computer Assurance (COMPASS’89), IEEE Computer Society Press, 1989, p.84.Google Scholar
  78. [78]
    “Report on the Formal Specification and Partial Verification of the VIPER Microprocessor”, Bishop Brock and Warren Hunt Jr., Proceedings of the 6thAnnual Conference on Computer Assurance (COMPASS’91), IEEE Computer Society Press, 1991, p.91.Google Scholar
  79. [79]
    “User Threatens Court Action over MoD Chip”, Simon Hill, Computer Weekly, 5 July 1990, p.3.Google Scholar
  80. [80]
    “MoD in Row with Firm over Chip Development”, The Independent, 28 May 1991.Google Scholar
  81. [81]
    “The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems”, Olin Sibert, Phillip Porras, and Robert Lindell, Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1995, p.211.Google Scholar
  82. [82]
    “The Segment Descriptor Cache”, Robert Collins, Dr.Dobbs Journal, August 1998.Google Scholar
  83. [83]
    “The Caveats of Pentium System Management Mode”, Robert Collins, Dr.Dobbs Journal, May 1997.Google Scholar
  84. [84]
    “QNX crypt() broken”, Peter Gutmann, posting to the cryptography@c2.net mailing list, message-ID 95583323401676@kahu.cs.auckland.ac.nz, 16 April 2000.Google Scholar
  85. [85]
    “qnx crypt comprimised” [sic],’ sean’, posting to the bugtraq@securityfocus.com mailing list, message-ID 20000415030309.6007.qmail@securityfocus.-com, 15 April 2000.Google Scholar
  86. [86]
    “Adam’s Guide to the Iopener”, http://www.adamlotz.com/iopener.html.
  87. [87]
    “Hacking The iOpener”, http://iopener.how.to/.
  88. [88]
    “Iopener as a Thin Client!”, http://www.ltsp.org/documentation/-iopener.php.
  89. [89]
  90. [90]
    “I-Opener Running Linux”, http://www.linux-hacker.net/imod/-imod.html.
  91. [91]
    “Security Requirements for Cryptographic Modules”, FIPS PUB 140-2, National Institute of Standards and Technology, June 2001.Google Scholar
  92. [92]
    “Cryptographic Application Programming Interfaces (APIs)”, Bill Caelli, Ian Graham, and Luke O’Connor, Computers and Security, Vol.12,No.7 (November 1993), p.640.CrossRefGoogle Scholar
  93. [93]
    “The Best Available Technologies for Computer Security”, Carl Landwehr, IEEE Computer, Vol.16,No 7 (July 1983), p.86.Google Scholar
  94. [94]
    “A GYPSY-Based Kernel”, Bret Hartman, Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, p.219.Google Scholar
  95. [95]
    “KSOS — Development Methodology for a Secure Operating System”, T. Berson and G. Barksdale, National Computer Conference Proceedings, Vol.48 (1979), p.365.Google Scholar
  96. [96]
    “A Network Pump”, Myong Kang, Ira Moskowitz, and Daniel Lee, IEEE Transactions on Software Engineering, Vol.22,No.5 (May 1996), p.329.CrossRefGoogle Scholar
  97. [97]
    “Design and Assurance Strategy for the NRL Pump”, Myong Kang, Andrew Moore, and Ira Moskowitz, IEEE Computer, Vol.31,No.4 (April 1998), p.56.Google Scholar
  98. [98]
    “Blacker: Security for the DDN: Examples of A1 Security Engineering Trades”, Clark Weissman, Proceedings of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1992, p.286.Google Scholar
  99. [99]
    “Panel Session: Kernel Performance Issues”, Marvin Shaefer (chairman), Proceedings of the 1981 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1981, p.162.Google Scholar
  100. [100]
    “AIM — Advanced Infosec Machine”, Motorola Inc, 1999.Google Scholar
  101. [101]
    “AIM — Advanced Infosec Machine — Multi-Level Security”, Motorola Inc, 1998.Google Scholar
  102. [102]
    “Formal Construction of the Mathematically Analyzed Separation Kernel”, W. Martin, P. White, F.S. Taylor, and A. Goldberg, Proceedings of the 15thInternational Conference on Automated Software Engineering (ASE’00), IEEE Computer Society Press, September 2000, p.133.Google Scholar
  103. [103]
    “An Avenue for High Confidence Applications in the 21st Century”, Timothy Kremann, William Martin, and Frank Taylor, Proceedings of the 22ndNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1999, CDROM distribution.Google Scholar
  104. [104]
    “Integrating an Object-Oriented Data Model with Multilevel Security”, Sushil Jajodia and Boris Kogan, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.76.Google Scholar
  105. [105]
    “Security Issues of the Trusted Mach System”, Martha Branstad, Homayoon Tajalli, and Frank Meyer, Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, p.362.Google Scholar
  106. [106]
    “Access Mediation in a Message Passing Kernel”, Martha Branstad, Homayoon Tajalli, Frank Meyer, and David Dalva, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.66.Google Scholar
  107. [107]
    “Transaction Control Expressions for Separation of Duties”, Ravi Sandhu, Proceedings of the 4th Aerospace Computer Security Applications Conference, December 1988, p.282.Google Scholar
  108. [108]
    “Separation of Duties in Computerised Information Systems”, Ravi Sandhu, Database Security IV: Status and Prospects, Elsevier Science Publishers, 1991, p.179.Google Scholar
  109. [109]
    “Implementing Transaction Control Experssions by Checking for Absence of Access Rights”, Paul Ammann and Ravi Sandhu, Proceedings of the 8thAnnual Computer Security Applications Conference, December 1992, p.131.Google Scholar
  110. [110]
    “Enforcing Complex Security Policies for Commercial Applications”, I-Lung Kao and Randy Chow, Proceedings of the 19thAnnual International Computer Software and Applications Conference (COMPSAC’95), IEEE Computer Society Press, 1995, p.402.Google Scholar
  111. [111]
    “Enforcement of Complex Security Policies with BEAC”, I-Lung Kao and Randy Chow, Proceedings of the 18thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1995, p.1.Google Scholar
  112. [112]
    “A TCB Subset for Integrity and Role-based Access Control”, Daniel Sterne, Proceedings of the 15thNational Computer Security Conference, October 1992, p.680.Google Scholar
  113. [113]
    “Regulating Processing Sequences via Object State”, David Sherman and Daniel Sterne, Proceedings of the 16thNational Computer Security Conference, October 1993, p.75.Google Scholar
  114. [114]
    “A Relational Database Security Policy”, Rae Burns, Computer Security and Information Integrity, Elsevier Science Publishers, 1991, p.89.Google Scholar
  115. [115]
    “Extended Discretionary Access Controls”, Stephen Vinter, Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, p.39.Google Scholar
  116. [116]
    “Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control Systems”, Adrian Spalka, Armin Cremers, and Hurtmut Lehmler, Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP’00), Springer-Verlag Lecture Notes in Computer Science No.1841, July 200, p.1.Google Scholar
  117. [117]
    “On the Need for a Third Form of Access Control”, Richard Graubart, Proceedings of the 12thNational Computer Security Conference, October 1989, p.296.Google Scholar
  118. [118]
    “Beyond the Pale of MAC and DAC — Defining New Forms of Access Control”, Catherine McCollum, Judith Messing, and LouAnna Notargiacomo, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.190.Google Scholar
  119. [119]
    “Testing Object-Oriented Systems”, Robert Binder, Addison-Wesley, 1999.Google Scholar
  120. [120]
    “Operating Systems: Design and Implementation (2nd ed)”, Andrew Tanenbaum and Albert Woodhull, Prentice-Hall, 1997.Google Scholar
  121. [121]
    “Attacks on Cryptoprocessor Transaction Sets”, Mike Bond, Proceedings of the 3rdInternational Workshop on Cryptographic Hardware and Embedded Systems (CHES’01), Springer-Verlag Lecture Notes in Computer Science No.2162, 2001, p.220.Google Scholar
  122. [122]
    “API-Level Attacks on Embedded Systems”, Mike Bond and Ross Anderson, IEEE Computer, Vol.34,No.10 (October 2001), p.67.Google Scholar
  123. [123]
    “Knowledge-Based Computer Security Advisor”, W. Hunteman and M. Squire, Proceedings of the 14thNational Computer Security Conference, October 1991, p.347.Google Scholar
  124. [124]
    “Integrating Cryptography in the Trusted Computing Base”, Michael Roe and Tom Casey, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.50.Google Scholar

Copyright information

© Springer-Verlag New York, Inc. 2004

Personalised recommendations