1972
DOI: 10.21236/ad0772806
|View full text |Cite
|
Sign up to set email alerts
|

Computer Security Technology Planning Study. Volume 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
339
0
5

Year Published

2002
2002
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 371 publications
(344 citation statements)
references
References 0 publications
0
339
0
5
Order By: Relevance
“…Their importance was already pointed out in the Anderson report [1]. The paradigmatic Bell-LaPadula model [18], conceived in 1973, constituted the first big effort on providing a formal setting in which to study and reason on confidentiality properties of data in time-sharing mainframe systems.…”
Section: Introductionmentioning
confidence: 99%
“…Their importance was already pointed out in the Anderson report [1]. The paradigmatic Bell-LaPadula model [18], conceived in 1973, constituted the first big effort on providing a formal setting in which to study and reason on confidentiality properties of data in time-sharing mainframe systems.…”
Section: Introductionmentioning
confidence: 99%
“…Developmental threats include errors made by the development team or the malicious insertion of unintended functionality by adversaries, both of which undermine or subvert the ability of the system to protect itself from tampering or to continuously enforce critical security policy [2,52].…”
Section: Threats and Requirementsmentioning
confidence: 99%
“…If the community subject to this policy is small enough, then such enforcement can sometimes be carried out by employing a trusted third party (TTP) to function as a kind of reference monitor [1], which mediates all the interactions subject to it. This has been done by several projects [3,12], mostly in the context of distributed enterprise systems.…”
Section: Introductionmentioning
confidence: 99%