- Bell, D.E., L.J. LaPadula. "Secure Computer System: Unified Exposition and Multies Interpretation". Tech. Rept. MTR-2997, MITRE Corp., Bedford, Mass., July 1975.Google Scholar
- Conway, R.W., W.L. Maxwell, H.L. Morgan. "On the Implementation of Security Measures in Information Systems." Commun. ACM 15, 4 (April 1972), 211-220. Google ScholarDigital Library
- Department of Defense. Trusted Computer Systems Evaluation Criteria. CSC-STD-001-83 August 15, 1983.Google Scholar
- Good, D.I., R.M. Cohen, C.G. Hoch, L.W. Hunter, D.F. Hare. "Report on the Language Gypsy, Version 2.0". Tech.Rept. ICSCA-CMP-10, Institute for Computing Science, University of Texas at Austin, Austin, Texas, September, 1978.Google Scholar
- Graham, G.S., and P.J. Denning. Protection-Principles and Practice. Proceedings Spring Joint Computer Conference, Montvale, N.J., 1972, pp. 417-429.Google Scholar
- Harrison, M.A., W.L. Ruzzo, J.D. Ullman. "Protection in Operating Systems." Commun. ACM 19, 8 (August 1976), 461-471. Google ScholarDigital Library
- Lampson, B.W. Protection. Proceedings 5th Princeton Symposium on Info. Sci. and Syst., Princeton University, March 1971.Google Scholar
- Schell, R.R. Security Kernels: A Methodical Design of System Security. Technical Papers, USE Inc. Spring Conference, March 5-9, 1979, pp. 245-250.Google Scholar
- Smith, Michael K. "Model and Design Proofs in Gypsy: An Example Using Bell and LaPadula". Tech. Rept. 122, Institute for Computing Science, University of Texas at Austin, Austin, Texas, November, 1983.Google Scholar
Recommendations
An attribute-based access matrix model
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingIn traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a system completely. Modern access control practices, such as DRM, trust ...
A delegation model for extended RBAC
In the field of access control, delegation is an important aspect that is considered part of the administration mechanism. Thus, a comprehensive access control model must provide a flexible administration model to manage delegation and revocation. ...
The Rank Factorization for Central Extended Matrix
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesWe study the rank factorization and full rank factorization of a special class of centrosymmetric matrices: the central extended matrix which is not only a centrosymmetric matrix but also a row extended matrix. The formula for the rank factorization is ...
Comments