Computer Security Technology Planning Study

作者: James P. Anderson

DOI:

关键词:

摘要: … The technical issue of multilevel computer security is … shared use multi¬ level computer systems present to a malicious … which security depends (L e., the control of the computer vested in …

参考文章(3)
Dean Hanawalt Vanderbilt, Controlled information sharing in a computer utility Massachusetts Institute of Technology. ,(1969)
T. D. Friedman, The authorization problem in shared files IBM Systems Journal. ,vol. 9, pp. 258- 280 ,(1970) , 10.1147/SJ.94.0258
C. Weissman, Security controls in the ADEPT-50 time-sharing system Proceedings of the November 18-20, 1969, fall joint computer conference on - AFIPS '69 (Fall). pp. 119- 133 ,(1969) , 10.1145/1478559.1478574