Refereed paper: Trusted system concepts

作者: Marshall D. Abrams , Michael V. Joyce

DOI: 10.1016/0167-4048(95)97025-6

关键词: Distributed algorithmComputer security modelTrusted Network ConnectDistributed System Security ArchitectureTrusted computing baseTrusted systemComputer securityAccess controlComputer science

摘要: This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this changing environment, such as distributed systems and need to support multiple access control policies, necessitate a generalization Trusted Computing Base paradigm. paper develops conceptual framework with which address implications growing reliance on Policy-Enforcing Applications environments.

参考文章(28)
Anita Katherine Jones, Protection in programmed systems. Carnegie Mellon University. ,(1973)
Terry Mayfield, J. E. Roskos, Stephen R. Welke, John M. Boone, Catherine W. McDonald, Integrity in Automated Information Systems Defense Technical Information Center. ,(1991) , 10.21236/ADA245555
Brian Randell, Carl E. Landwehr, Luca Simoncini, Dependable Computing for Critical Applications ,(1991)
Jonathan K Millen, None, Denial of Service: A Perspective Springer, Vienna. pp. 93- 108 ,(1995) , 10.1007/978-3-7091-9396-9_10
Marshall D. Abrams, Edward G. Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams, Report of an integrity research study group Computers & Security. ,vol. 12, pp. 679- 689 ,(1993) , 10.1016/0167-4048(93)90085-J
Ellis Cohen, David Jefferson, Protection in the Hydra Operating System ACM SIGOPS Operating Systems Review. ,vol. 9, pp. 141- 160 ,(1975) , 10.1145/1067629.806532
R.S. Sandhu, Lattice-based access control models IEEE Computer. ,vol. 26, pp. 9- 19 ,(1993) , 10.1109/2.241422