The Reference Monitor Concept as a Unifying Principle in Computer Security Education

作者: Cynthia E. Irvine

DOI: 10.21236/ADA423529

关键词:

摘要: Abstract : For over twenty-five years the Reference Monitor Concept has proved itself to be a useful tool for computer security practioners. It can also used as conceptual in education. This paper describes education at Naval Postgraduate School that concept unifying principle courses laboratory work and student research. The intent of program is produce graduates who will think critically about design implementation systems intended enforce policies.

参考文章(18)
O. Sibert, P.A. Porras, R. Lindell, The Intel 80/spl times/86 processor architecture: pitfalls for secure systems ieee symposium on security and privacy. pp. 211- 222 ,(1995) , 10.1109/SECPRI.1995.398934
Morrie Gasser, Building a Secure Computer System ,(1988)
John J. Marciniak, Encyclopedia of Software Engineering ,(1994)
Philip Alan Myers, Subversion : the neglected aspect of computer security. Naval Postgraduate School (U.S.). ,(1980)
Jason Hackerson, Cynthia E. Irvine, Dion A. Robb, James P. Anderson, High Assurance Multilevel Services For Off-The-Shelf Workstation Applications Proceedings of the National Information Systems Security Conference, Crystal City, VA, pp. 421-431, October 1998. ,(1998)
J. McLean, Is The Trusted Computing Base Concept Fundamentally Flawed ieee symposium on security and privacy. pp. 2- 2 ,(1997) , 10.1109/SECPRI.1997.601304
B. Blakley, D.M. Kienzle, Some weaknesses of the TCB model ieee symposium on security and privacy. pp. 3- 5 ,(1997) , 10.1109/SECPRI.1997.601305
Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman, Protection in operating systems Communications of The ACM. ,vol. 19, pp. 461- 471 ,(1976) , 10.1145/360303.360333
Dorothy E. Denning, A lattice model of secure information flow Communications of the ACM. ,vol. 19, pp. 236- 243 ,(1976) , 10.1145/360051.360056