References
Next: About this document
Up: Role-Based Access Controls
Previous: Summary and Conclusions
References
- 1
-
D.D. Clark and D.R. Wilson.
A Comparison of Commercial and Military Computer Security
Policies.
In IEEE Symposium on Computer Security and Privacy, April 1987.
- 2
-
Computers at Risk.
National Research Council, National Academy Press, 1991.
- 3
-
Minimum Security Functionality Requirements for Multi-User Operating
Systems (draft).
Computer Systems Laboratory, NIST, January 27 1992.
- 4
-
Trusted Computer Security Evaluation Criteria, DOD 5200.28-STD.
Department of Defense, 1985.
- 5
-
Z.G. Ruthberg and W.T. Polk, Editors.
Report of the Invitational Workshop on Data Integrity.
SP 500-168. Natl. Inst. of Stds. and Technology, 1989.
- 6
-
S.W. Katzke and Z.G. Ruthberg, Editors.
Report of the Invitational Workshop on Integrity Policy
in Computer Information Systems.
SP 500-160. Natl. Inst. of Stds. and Technology, 1987.
- 7
-
J.E. Roskos, S.R. Welke, J.M. Boone, and T. Mayfield.
Integrity in Tactical and Embedded Systems.
Institute for Defense Analyses, HQ 89-034883/1, October 1989.
- 8
-
Integrity in Automated Information Systems.
National Computer Security, Center, September 1991.
- 9
-
R.W. Baldwin.
Naming and Grouping Privileges to Simplify Security
Management in Large Databases.
In IEEE Symposium on Computer Security and Privacy,
1990.
- 10
-
K.R. Poland M.J. Nash.
Some Conundrums Concerning Separation of Duty.
In IEEE Symposium on Computer Security and Privacy,
1990.
- 11
-
Security Requirements for Cryptographic Modules.
Federal Information Processing Standard 140-1, National Institute of
Standards and Technology, 1992.
- 12
-
W.R. Shockley.
Implementing the Clark/Wilson Integrity Policy Using
Current Technology.
In Proceedings of 11th National Computer Security
Conference, October 1988.
- 13
-
A R. Sandhu.
Transaction Control Expressions for Separation of Duties.
In Fourth Aerospace Computer Security Applications
Conference, December 1988.
- 14
-
S. Wiseman P. Terry.
A 'New' Security Policy Model.
In IEEE Symposium on Computer Security and Privacy, May
1989.
Next: About this document
Up: Role-Based Access Controls
Previous: Summary and Conclusions
John Barkley
Mon Jan 9 13:56:57 EST 1995