Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
3.9 References
“Evaluation of Security Model Rule Bases”, John Page, Jody Heaney, Marc Adkins, and Gary Dolsen, Proceedings of the 12thNational Computer Security Conference, October 1989, p.98.
“A Generalized Framework for Access Control: An Informal Description”, Marshall Abrams, Leonard LaPadula, Kenneth Eggers, and Ingrid Olson, Proceedings of the 13thNational Computer Security Conference, October 1990, p.135.
“A Generalized Framework for Database Access Controls”, Marshall Abrams and Gary Smith, Database Security IV: Status and Prospects, North-Holland, 1991, p.171.
“Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy”, Marshall Abrams, Jody Heaney, Osborne King, Leonard LaPadula, Manette Lazear, and Ingrid Olson, Proceedings of the 14thNational Computer Security Conference, October 1991, p.257.
“A Framework for Access Control Models”, Burkhard Lau, Proceedings of the IFIP TC11 11thInternational Conference on Information Security (IFIP/Sec’95), 1995, p.513.
“Rule-Set Modeling of a Trusted Computer System”, Leonard LaPadula, “Information Security: An Integrated Collection of Essays”, IEEE Computer Society Press, 1995, p.187.
“Mediation and Separation in Contemporary Information Technology Systems”, Marshall Abrams, Jody Heaney, and Michael Joyce, Proceedings of the 15thNational Computer Security Conference, October 1992, p.359.
“Information Retrieval, Transfer and Management for OSI: Access Control Framework”, ISO 10181-3, 1993.
“The COPS (Common Open Policy Service) Protocol”, RFC 2748, Jim Boyle, Ron Cohen, David Durham, Raju Rajan, Shai Herzog, and Arun Sastry, January 2000.
“Remote Authentication Dial In User Service (RADIUS)”, RFC 2138, Carl Rigney, Allan C. Rubens, William Allen Simpson, and Steve Willens, April 1997.
“Diameter Base Protocol”, Pat R. Calhoun, Jari Arkko, Erik Guttman, Glen Zorn, and John Loughney, draft-ietf-aaa-diameter-11.txt, June 2002.
“The Integrity-Lock Approach to Secure Database Management”, Richard Graubart, Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, p.62.
“Towards Practical MLS Database Management Systems using the Integrity Lock Technology”, Rae Burns, Proceedings of the 9thNational Computer Security Conference, September 1986, p.25.
“Providing Policy Control Over Object Operations in a Mach Based System”, Spencer Minear, Proceedings of the 5thUsenix Security Symposium, June 1995, p.141.
“A Comparison of Methods for Implementing Adaptive Security Policies”, Michael Carney and Brian Loe, Proceedings of the 7thUsenix Security Symposium, January 1998, p.1.
“Developing and Using a ‘Policy Neutral’ Access Control Policy”, Duane Olawsky, Todd Fine, Edward Schneider, and Ray Spencer, Proceedings of the 1996 ACM New Security Paradigms Workshop, September 1996, p.60.
“The Flask Security Architecture: System Support for Diverse Security Policies”, Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Pepreau, Proceedings of the 8thUsenix Security Symposium, August 1999, p.123.
“The Privilege Control Table Toolkit: An Implementation of the System Build Approach”, Thomas Woodall and Roberta Gotfried, Proceedings of the 19thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1996, p.389.
“Protected Groups: An Approach to Integrity and Secrecy in an Object-oriented Database”, James Slack and Elizabeth Unger, Proceedings of the 15thNational Computer Security Conference, October 1992, p.513.
“Security In An Object-Oriented Database”, James Slack, Proceedings of the 1993 New Security Paradigms Workshop, ACM, 1993, p.155.
“An Access Control Language for Object-Oriented Programming Systems”, Masaaki Mizuno and Arthur Oldehoeft, The Journal of Systems and Software, Vol.13,No.1 (September 1990), p.3.
“Meta Objects for Access Control: Extending Capability-Based Security”, Thomas Riechmann and Franz Hauck, Proceedings of the 1997 ACM New Security Paradigms Workshop, September 1997, p.17.
“Meta Objects for Access Control: Role-Based Principals”, Thomas Riechmann and Jürgen Kleinöder, Proceedings of the 3rdAustralasian Conference on Information Security and Privacy (ACISP’98), Springer-Verlag Lecture Notes in Computer Science, No.1438, July 1998, p.296.
“Discretionary access control by means of usage conditions”, Eike Born and Helmut Steigler, Computers and Security, Vol.13,No.5 (October 1994), p.437.
“Meta Objects for Access Control: A Formal Model for Role-Based Principals”, Thomas Riechmann and Franz Hauck, Proceedings of the 1998 ACM New Security Paradigms Workshop, September 1998, p.30.
“Security Requirements for Cryptographic Modules”, FIPS PUB 140-2, National Institute of Standards and Technology, July 2001.
“HOWTO: Export/Import Plain Text Session Key Using CryptoAPI”, Microsoft Knowledge Base Article Q228786, Microsoft Corporation, 11 January 2000.
“Cryptographic Equipment Security: A Code of Practice”, Stephen Serpell, Computers and Security, Vol.4,No.1 (March 1985), p.47.
Rights and permissions
Copyright information
© 2004 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
(2004). The Kernel Implementation. In: Cryptographic Security Architecture. Springer, New York, NY. https://doi.org/10.1007/0-387-21551-4_3
Download citation
DOI: https://doi.org/10.1007/0-387-21551-4_3
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-95387-8
Online ISBN: 978-0-387-21551-8
eBook Packages: Springer Book Archive