Sciweavers

66
Voted
SP
1990
IEEE
15 years 26 days ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland
80
Voted
SP
1990
IEEE
15 years 26 days ago
Security Models and Information Flow
John McLean
SP
1990
IEEE
15 years 26 days ago
A VMM Security Kernel for the VAX Architecture
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware,...
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin...
SP
1990
IEEE
100views Security Privacy» more  SP 1990»
15 years 26 days ago
Polyinstantiation Integrity in Multilevel Relations
Sushil Jajodia, Ravi S. Sandhu
SP
1990
IEEE
15 years 26 days ago
A Network Security Monitor
L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt,...
SP
1990
IEEE
15 years 26 days ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III