Skip to main content
  • 268 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

3.9 References

  1. “Evaluation of Security Model Rule Bases”, John Page, Jody Heaney, Marc Adkins, and Gary Dolsen, Proceedings of the 12thNational Computer Security Conference, October 1989, p.98.

    Google Scholar 

  2. “A Generalized Framework for Access Control: An Informal Description”, Marshall Abrams, Leonard LaPadula, Kenneth Eggers, and Ingrid Olson, Proceedings of the 13thNational Computer Security Conference, October 1990, p.135.

    Google Scholar 

  3. “A Generalized Framework for Database Access Controls”, Marshall Abrams and Gary Smith, Database Security IV: Status and Prospects, North-Holland, 1991, p.171.

    Google Scholar 

  4. “Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy”, Marshall Abrams, Jody Heaney, Osborne King, Leonard LaPadula, Manette Lazear, and Ingrid Olson, Proceedings of the 14thNational Computer Security Conference, October 1991, p.257.

    Google Scholar 

  5. “A Framework for Access Control Models”, Burkhard Lau, Proceedings of the IFIP TC11 11thInternational Conference on Information Security (IFIP/Sec’95), 1995, p.513.

    Google Scholar 

  6. “Rule-Set Modeling of a Trusted Computer System”, Leonard LaPadula, “Information Security: An Integrated Collection of Essays”, IEEE Computer Society Press, 1995, p.187.

    Google Scholar 

  7. “Mediation and Separation in Contemporary Information Technology Systems”, Marshall Abrams, Jody Heaney, and Michael Joyce, Proceedings of the 15thNational Computer Security Conference, October 1992, p.359.

    Google Scholar 

  8. “Information Retrieval, Transfer and Management for OSI: Access Control Framework”, ISO 10181-3, 1993.

    Google Scholar 

  9. “The COPS (Common Open Policy Service) Protocol”, RFC 2748, Jim Boyle, Ron Cohen, David Durham, Raju Rajan, Shai Herzog, and Arun Sastry, January 2000.

    Google Scholar 

  10. “Remote Authentication Dial In User Service (RADIUS)”, RFC 2138, Carl Rigney, Allan C. Rubens, William Allen Simpson, and Steve Willens, April 1997.

    Google Scholar 

  11. “Diameter Base Protocol”, Pat R. Calhoun, Jari Arkko, Erik Guttman, Glen Zorn, and John Loughney, draft-ietf-aaa-diameter-11.txt, June 2002.

    Google Scholar 

  12. “The Integrity-Lock Approach to Secure Database Management”, Richard Graubart, Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, p.62.

    Google Scholar 

  13. “Towards Practical MLS Database Management Systems using the Integrity Lock Technology”, Rae Burns, Proceedings of the 9thNational Computer Security Conference, September 1986, p.25.

    Google Scholar 

  14. “Providing Policy Control Over Object Operations in a Mach Based System”, Spencer Minear, Proceedings of the 5thUsenix Security Symposium, June 1995, p.141.

    Google Scholar 

  15. “A Comparison of Methods for Implementing Adaptive Security Policies”, Michael Carney and Brian Loe, Proceedings of the 7thUsenix Security Symposium, January 1998, p.1.

    Google Scholar 

  16. “Developing and Using a ‘Policy Neutral’ Access Control Policy”, Duane Olawsky, Todd Fine, Edward Schneider, and Ray Spencer, Proceedings of the 1996 ACM New Security Paradigms Workshop, September 1996, p.60.

    Google Scholar 

  17. “The Flask Security Architecture: System Support for Diverse Security Policies”, Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Pepreau, Proceedings of the 8thUsenix Security Symposium, August 1999, p.123.

    Google Scholar 

  18. “The Privilege Control Table Toolkit: An Implementation of the System Build Approach”, Thomas Woodall and Roberta Gotfried, Proceedings of the 19thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1996, p.389.

    Google Scholar 

  19. “Protected Groups: An Approach to Integrity and Secrecy in an Object-oriented Database”, James Slack and Elizabeth Unger, Proceedings of the 15thNational Computer Security Conference, October 1992, p.513.

    Google Scholar 

  20. “Security In An Object-Oriented Database”, James Slack, Proceedings of the 1993 New Security Paradigms Workshop, ACM, 1993, p.155.

    Google Scholar 

  21. “An Access Control Language for Object-Oriented Programming Systems”, Masaaki Mizuno and Arthur Oldehoeft, The Journal of Systems and Software, Vol.13,No.1 (September 1990), p.3.

    Article  Google Scholar 

  22. “Meta Objects for Access Control: Extending Capability-Based Security”, Thomas Riechmann and Franz Hauck, Proceedings of the 1997 ACM New Security Paradigms Workshop, September 1997, p.17.

    Google Scholar 

  23. “Meta Objects for Access Control: Role-Based Principals”, Thomas Riechmann and Jürgen Kleinöder, Proceedings of the 3rdAustralasian Conference on Information Security and Privacy (ACISP’98), Springer-Verlag Lecture Notes in Computer Science, No.1438, July 1998, p.296.

    Google Scholar 

  24. “Discretionary access control by means of usage conditions”, Eike Born and Helmut Steigler, Computers and Security, Vol.13,No.5 (October 1994), p.437.

    Article  Google Scholar 

  25. “Meta Objects for Access Control: A Formal Model for Role-Based Principals”, Thomas Riechmann and Franz Hauck, Proceedings of the 1998 ACM New Security Paradigms Workshop, September 1998, p.30.

    Google Scholar 

  26. “Security Requirements for Cryptographic Modules”, FIPS PUB 140-2, National Institute of Standards and Technology, July 2001.

    Google Scholar 

  27. “HOWTO: Export/Import Plain Text Session Key Using CryptoAPI”, Microsoft Knowledge Base Article Q228786, Microsoft Corporation, 11 January 2000.

    Google Scholar 

  28. “Cryptographic Equipment Security: A Code of Practice”, Stephen Serpell, Computers and Security, Vol.4,No.1 (March 1985), p.47.

    Article  Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

(2004). The Kernel Implementation. In: Cryptographic Security Architecture. Springer, New York, NY. https://doi.org/10.1007/0-387-21551-4_3

Download citation

  • DOI: https://doi.org/10.1007/0-387-21551-4_3

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-95387-8

  • Online ISBN: 978-0-387-21551-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics