next up previous
Next: ï üÔÏÍ äÏËÕÍÅÎÔÅ Up: úÁËÌÀÞÅÎÉÅ Previous: úÁËÌÀÞÅÎÉÅ

óÐÒÁ×ÏÞÎÙÊ ÍÁÔÅÒÉÁÌ:

[Abrams et al. 1990] Marshall Abrams, K.Eggers, L.LaPadula, I.Olson, "A Generalized Framework for Access Control: An Informal Description", Proceedings of the 13th National Computer Security Conference, Washington, October 1990;

[Brunnstein/Fischer-Hu"bner/Swimmer 1991] Klaus Brunnstein, Simone Fischer-Hu"bner, Morton Swimmer, "Concepts of an Expert System for Virus Detection", in: D.Lindsy, W.L.Price (Eds.): Information Security - Proceedings of the IFIP/Sec91-Conference, Brighton/UK, May 1991, North Holland;

[Fischer-Hu"bner 1997] Simone Fischer-Hu"bner, "A Formal Task-based Privacy Model and its Implementation: An updated Report", Proceedings of the Second Nordic Workshop on Secure Computer Systems NORDSEC'97, Helsinki, November 6-7, 1997;

[Fischer-Hu"bner/Ott 1998] Simone Fischer-Hu"bner, Amon Ott, "From a Formal Privacy Model to its Implementation", Proceedings of the 21st National Information System Security Conference, Arlington, October 1998;

[LaPadula 1995] Leonard LaPadula, "Rule-Set Modelling of Trusted Computer System", Essay 9 in: M.Abrams, S.Jajodia, H. Podell, "Information Security - An integrated Collection of Essays", IEEE Computer Society Press, 1995;

[Ott 1998] Amon Ott, "Rule Set Based Access Control in Linux", http://agn-www.informatik.uni-hamburg.de/people/1ott/rsbac/eng.htm;

[Kephart/Sorkin/Swimmer/White 1997] Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White, "Blueprint for a Computer Immune System", Proceedings of the Virus Bulleting Conference 1997, http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/Kephart/VB97/;

[Kephart 1994], Jeffrey O. Kephart, "A Biologically Inspired Immune System for Computers", Artificial Life IV, Proceedings of the Forth International Workshop on the Synthesis and Simulation of Living Systems, Rodney A. Brools and Pattie Maes, eds, Mass. 1994, http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/Kephart/ALIFE4/alife4.distrib.html;

[Aggelis/Gritzalis 1998], George Aggelis and Stefanos Gritzalis, "Security Issues Surrounding Programming Languages for Mobile Code: JAVA vs. Safe-Tcl", ACM SIGOPS, Volume 32, Number 2, April, 1998.


next up previous
Next: ï üÔÏÍ äÏËÕÍÅÎÔÅ Up: úÁËÌÀÞÅÎÉÅ Previous: úÁËÌÀÞÅÎÉÅ