Abstraction and verification in Alphard: defining and specifying iteration and generators
Communications of the ACM
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
Communications of the ACM
A note on the confinement problem
Communications of the ACM
ACM SIGOPS Operating Systems Review
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS
NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS
Report on the programming language Euclid
ACM SIGPLAN Notices
The multics system: an examination of its structure
The multics system: an examination of its structure
Implementing commercial data integrity with secure capabilities
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Hi-index | 0.00 |
This paper defines the lattice security model and shows it to be useful in private sector applications of decentralized computer networks. It examines discretionary security models and shows them to be inadequate to protect against “Trojan Horse” attacks. It examines the management of large security lattices and proposes solutions to the proliferation of categories problem.