The Kernel Implementation



Access Control Security Policy Action Object Usage Count Interface Object 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

3.9 References

  1. [1]
    “Evaluation of Security Model Rule Bases”, John Page, Jody Heaney, Marc Adkins, and Gary Dolsen, Proceedings of the 12thNational Computer Security Conference, October 1989, p.98.Google Scholar
  2. [2]
    “A Generalized Framework for Access Control: An Informal Description”, Marshall Abrams, Leonard LaPadula, Kenneth Eggers, and Ingrid Olson, Proceedings of the 13thNational Computer Security Conference, October 1990, p.135.Google Scholar
  3. [3]
    “A Generalized Framework for Database Access Controls”, Marshall Abrams and Gary Smith, Database Security IV: Status and Prospects, North-Holland, 1991, p.171.Google Scholar
  4. [4]
    “Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy”, Marshall Abrams, Jody Heaney, Osborne King, Leonard LaPadula, Manette Lazear, and Ingrid Olson, Proceedings of the 14thNational Computer Security Conference, October 1991, p.257.Google Scholar
  5. [5]
    “A Framework for Access Control Models”, Burkhard Lau, Proceedings of the IFIP TC11 11thInternational Conference on Information Security (IFIP/Sec’95), 1995, p.513.Google Scholar
  6. [6]
    “Rule-Set Modeling of a Trusted Computer System”, Leonard LaPadula, “Information Security: An Integrated Collection of Essays”, IEEE Computer Society Press, 1995, p.187.Google Scholar
  7. [7]
    “Mediation and Separation in Contemporary Information Technology Systems”, Marshall Abrams, Jody Heaney, and Michael Joyce, Proceedings of the 15thNational Computer Security Conference, October 1992, p.359.Google Scholar
  8. [8]
    “Information Retrieval, Transfer and Management for OSI: Access Control Framework”, ISO 10181-3, 1993.Google Scholar
  9. [9]
    “The COPS (Common Open Policy Service) Protocol”, RFC 2748, Jim Boyle, Ron Cohen, David Durham, Raju Rajan, Shai Herzog, and Arun Sastry, January 2000.Google Scholar
  10. [10]
    “Remote Authentication Dial In User Service (RADIUS)”, RFC 2138, Carl Rigney, Allan C. Rubens, William Allen Simpson, and Steve Willens, April 1997.Google Scholar
  11. [11]
    “Diameter Base Protocol”, Pat R. Calhoun, Jari Arkko, Erik Guttman, Glen Zorn, and John Loughney, draft-ietf-aaa-diameter-11.txt, June 2002.Google Scholar
  12. [12]
    “The Integrity-Lock Approach to Secure Database Management”, Richard Graubart, Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, p.62.Google Scholar
  13. [13]
    “Towards Practical MLS Database Management Systems using the Integrity Lock Technology”, Rae Burns, Proceedings of the 9thNational Computer Security Conference, September 1986, p.25.Google Scholar
  14. [14]
    “Providing Policy Control Over Object Operations in a Mach Based System”, Spencer Minear, Proceedings of the 5thUsenix Security Symposium, June 1995, p.141.Google Scholar
  15. [15]
    “A Comparison of Methods for Implementing Adaptive Security Policies”, Michael Carney and Brian Loe, Proceedings of the 7thUsenix Security Symposium, January 1998, p.1.Google Scholar
  16. [16]
    “Developing and Using a ‘Policy Neutral’ Access Control Policy”, Duane Olawsky, Todd Fine, Edward Schneider, and Ray Spencer, Proceedings of the 1996 ACM New Security Paradigms Workshop, September 1996, p.60.Google Scholar
  17. [17]
    “The Flask Security Architecture: System Support for Diverse Security Policies”, Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Pepreau, Proceedings of the 8thUsenix Security Symposium, August 1999, p.123.Google Scholar
  18. [18]
    “The Privilege Control Table Toolkit: An Implementation of the System Build Approach”, Thomas Woodall and Roberta Gotfried, Proceedings of the 19thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1996, p.389.Google Scholar
  19. [19]
    “Protected Groups: An Approach to Integrity and Secrecy in an Object-oriented Database”, James Slack and Elizabeth Unger, Proceedings of the 15thNational Computer Security Conference, October 1992, p.513.Google Scholar
  20. [20]
    “Security In An Object-Oriented Database”, James Slack, Proceedings of the 1993 New Security Paradigms Workshop, ACM, 1993, p.155.Google Scholar
  21. [21]
    “An Access Control Language for Object-Oriented Programming Systems”, Masaaki Mizuno and Arthur Oldehoeft, The Journal of Systems and Software, Vol.13,No.1 (September 1990), p.3.CrossRefGoogle Scholar
  22. [22]
    “Meta Objects for Access Control: Extending Capability-Based Security”, Thomas Riechmann and Franz Hauck, Proceedings of the 1997 ACM New Security Paradigms Workshop, September 1997, p.17.Google Scholar
  23. [23]
    “Meta Objects for Access Control: Role-Based Principals”, Thomas Riechmann and Jürgen Kleinöder, Proceedings of the 3rdAustralasian Conference on Information Security and Privacy (ACISP’98), Springer-Verlag Lecture Notes in Computer Science, No.1438, July 1998, p.296.Google Scholar
  24. [24]
    “Discretionary access control by means of usage conditions”, Eike Born and Helmut Steigler, Computers and Security, Vol.13,No.5 (October 1994), p.437.CrossRefGoogle Scholar
  25. [25]
    “Meta Objects for Access Control: A Formal Model for Role-Based Principals”, Thomas Riechmann and Franz Hauck, Proceedings of the 1998 ACM New Security Paradigms Workshop, September 1998, p.30.Google Scholar
  26. [26]
    “Security Requirements for Cryptographic Modules”, FIPS PUB 140-2, National Institute of Standards and Technology, July 2001.Google Scholar
  27. [27]
    “HOWTO: Export/Import Plain Text Session Key Using CryptoAPI”, Microsoft Knowledge Base Article Q228786, Microsoft Corporation, 11 January 2000.Google Scholar
  28. [28]
    “Cryptographic Equipment Security: A Code of Practice”, Stephen Serpell, Computers and Security, Vol.4,No.1 (March 1985), p.47.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag New York, Inc. 2004

Personalised recommendations