The foundation for security enforcement is access control. Re-sources must be protected against access by unauthorized entities. Furthermore, authorized entities must be prevented from accessing resources in inappropriate ways. A major challenge to the devel-oper of an access control policy is to provide users the flexibility to protect their resources as they see fit; system policies that are inconsistent with user needs are inadequate. In particular, systems that enforce a single, hard-coded policy cannot satisfy the needs of all users. As part of the Distributed Trusted Operating System (DTOS) program, we have developed and implemented a flexible security architecture using the Mach microkernel. In this architecture, the security rules e...
The identification of the major information technology (IT) access control policies is required to d...
Although several access control policies can be devised for controlling access to information, all e...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
The evolution of technological progress continually presents new information security challenges for...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Although several access control policies can be devised for controlling access to information, all e...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Abstract. We describe the motivation for moving policy enforcement for access control down to the di...
The identification of the major information technology (IT) access control policies is required to d...
Although several access control policies can be devised for controlling access to information, all e...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
The evolution of technological progress continually presents new information security challenges for...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Although several access control policies can be devised for controlling access to information, all e...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Abstract. We describe the motivation for moving policy enforcement for access control down to the di...
The identification of the major information technology (IT) access control policies is required to d...
Although several access control policies can be devised for controlling access to information, all e...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...