next up previous
Next: Об Этом Документе Up: Role-Compatibility Model для Безопасного Previous: Сравнение с предыдущими трудами.

Справочный материал:

Abrams et al. 1990] Marshall Abrams, K.Eggers, L.LaPadula, I.Olson, "A Generalized Framework for Access Control: An Informal Description", Proceedings of the 13th National Computer Security Conference, Washington, October 1990.

[Badger et al. 1995] Lee Badger, Daniel Sterne, David Sherman, Kenneth Walker, Sheila Haghighat, "Practical Domain and Type Enforcement for UNIX", 1995 IEEE Symposium on Security and Privacy.

[Ferraiolo/Kuhn 1992] D.Ferraiolo, R.Kuhn, "Role-Based Access Controls", Proceedings of the 15th National Computer Security Conference, Baltimore MD, October 1992.

[Ferraiolo/Cugini/Kuhn 1995] D.Ferraiolo, J.Cugini, R.Kuhn, "Role-Based Access Control (RBAC): Features and Motivations", Proceedings of the 11th Computer Security Application Conference, New Orleans, Louisiana, December 11-15, 1995.

[Ferraiolo/Barkley/Kuhn 1997] D.Ferraiolo, J.Barkely, R.Kuhn, "A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet", ACM Transactions on Information and System Security, Vol.2, No.1, February 1999, pp. 34-64.

[Fischer-Hu"bner/Ott 1998] Simone Fischer-Hu"bner, Amon Ott, "From a Formal Privacy Model to its Implementation", Proceedings of the 21st National Information System Security Conference, Arlington, October 1998.

[LaPadula 1995] Leonard LaPadula, "Rule-Set Modelling of Trusted Computer System", Essay 9 in: M.Abrams, S.Jajodia, H. Podell, "Information Security - An integrated Collection of Essays", IEEE Computer Society Press, 1995.

[Ott/Fischer-Hu"bner/Swimmer 1998] Amon Ott, Simone Fischer-Hu"bner, Morton Swimmer, "Approaches to Integrated Malware Detection and Avoidance", Proceedings of the 3rd Nordic Workshop on Secure IT Systems NORDSEC98, Trondheim, November 5-6, 1998, [*].


next up previous
Next: Об Этом Документе Up: Role-Compatibility Model для Безопасного Previous: Сравнение с предыдущими трудами.