[go: up one dir, main page]

Jordan, 1995 - Google Patents

Guide to Understanding Discretionary Access Control in Trusted Systems

Jordan, 1995

View HTML
Document ID
1238611281538406264
Author
Jordan C
Publication year

External Links

Snippet

Carole S. Jordan, National Computer Security Center (NCSC), as primary author and preparer of this document. Dr. Deborah Downs, the Aerospace Corporation, who prepared an in-depth technical report on DAC mechanisms that became the major input to this …
Continue reading at books.google.com (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Downs et al. Issues in discretionary access control
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
Sandhu et al. Access control: principle and practice
Baldwin Naming and Grouping Privileges to Simplify Security Management in Large Databases.
Tari et al. A role-based access control for intranet security
US5283830A (en) Security mechanism for a computer system
Bertino Data security
Bertino et al. Database security: Research and practice
KR100450402B1 (en) Access control method by a token with security attributes in computer system
AU704130B2 (en) Security system for computer systems
US7461395B2 (en) Distributed capability-based authorization architecture using roles
Karger Limiting the damage potential of discretionary Trojan horses
KR101101085B1 (en) Zone-based security management of data items
US20110302211A1 (en) Mandatory access control list for managed content
US20060193467A1 (en) Access control in a computer system
US7260718B2 (en) Method for adding external security to file system resources through symbolic link references
Abrams RENEWED UNDERSTANDING OF ACCESS CONTROL POLICIES¹
Lunt Access control policies: Some unanswered questions
Sahafizadeh et al. Survey on access control models
Pramanik et al. Security policies to mitigate insider threat in the document control domain
Jordan Guide to Understanding Discretionary Access Control in Trusted Systems
Graubart et al. A Preliminary Neval Surveillance OBMS Sacurity
De Capitani di Vimercati et al. Authorization and access control
Patil et al. Database Access Control Policies
Eßmayr et al. Access controls for federated database environments-taxonomy of design choices