On security models

作者: C. Eckert

DOI: 10.1007/978-1-5041-2919-0_43

关键词:

摘要: The history of designing secure systems teaches the inadequacy enhancing existing with additional security functions to enforce requirements. design a system should start precise requirement specification. Then, be able verify enforcement requested properties model must built. Selecting an appropriate is crucial decision. designer application aware different abilities offered by models as well impacts resulting from modeling decisions. paper sketches criteria evaluate models. Evaluating according these assist developer in selecting most cope his application-specific

参考文章(4)
Claudia Eckert, Matching Security Policies to Application Needs Springer US. pp. 237- 254 ,(1995) , 10.1007/978-0-387-34873-5_19
D. Elliott Bell, Leonard J. La Padula, Secure Computer System: Unified Exposition and Multics Interpretation Defense Technical Information Center. ,(1976) , 10.21236/ADA023588
Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman, Protection in operating systems Communications of The ACM. ,vol. 19, pp. 461- 471 ,(1976) , 10.1145/360303.360333
D.F.C. Brewer, M.J. Nash, The Chinese Wall security policy ieee symposium on security and privacy. pp. 206- 214 ,(1989) , 10.1109/SECPRI.1989.36295