Jordan, 1995 - Google Patents
Guide to Understanding Discretionary Access Control in Trusted SystemsJordan, 1995
View HTML- Document ID
- 1238611281538406264
- Author
- Jordan C
- Publication year
External Links
Snippet
Carole S. Jordan, National Computer Security Center (NCSC), as primary author and preparer of this document. Dr. Deborah Downs, the Aerospace Corporation, who prepared an in-depth technical report on DAC mechanisms that became the major input to this …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Downs et al. | Issues in discretionary access control | |
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Sandhu et al. | Access control: principle and practice | |
Baldwin | Naming and Grouping Privileges to Simplify Security Management in Large Databases. | |
Tari et al. | A role-based access control for intranet security | |
US5283830A (en) | Security mechanism for a computer system | |
Bertino | Data security | |
Bertino et al. | Database security: Research and practice | |
KR100450402B1 (en) | Access control method by a token with security attributes in computer system | |
AU704130B2 (en) | Security system for computer systems | |
US7461395B2 (en) | Distributed capability-based authorization architecture using roles | |
Karger | Limiting the damage potential of discretionary Trojan horses | |
KR101101085B1 (en) | Zone-based security management of data items | |
US20110302211A1 (en) | Mandatory access control list for managed content | |
US20060193467A1 (en) | Access control in a computer system | |
US7260718B2 (en) | Method for adding external security to file system resources through symbolic link references | |
Abrams | RENEWED UNDERSTANDING OF ACCESS CONTROL POLICIES¹ | |
Lunt | Access control policies: Some unanswered questions | |
Sahafizadeh et al. | Survey on access control models | |
Pramanik et al. | Security policies to mitigate insider threat in the document control domain | |
Jordan | Guide to Understanding Discretionary Access Control in Trusted Systems | |
Graubart et al. | A Preliminary Neval Surveillance OBMS Sacurity | |
De Capitani di Vimercati et al. | Authorization and access control | |
Patil et al. | Database Access Control Policies | |
Eßmayr et al. | Access controls for federated database environments-taxonomy of design choices |