Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Leonard J. LaPadula"'
Autor:
D. Elliott Bell, Leonard J. LaPadula
Publikováno v:
Journal of Computer Security. 4:239-263
Autor:
Leonard J. LaPadula
Publikováno v:
Journal of Computer Security. 4:233-238
Autor:
Edward G. Amoroso, Leonard J. LaPadula, Marshall D. Abrams, Teresa F. Lunt, James G. Williams
Publikováno v:
Computers & Security. 12:679-689
This paper describes issues and results obtained in the context of an integrity research study group. A specification and modeling taxonomy is shown to provide a framework for the group's integrity discussions and investigations. In particular, the C
Autor:
D. Elliott Bell, Leonard J. LaPadula
Publikováno v:
Journal of Computer Security. 4:229-231
The paper presents a set of rules of operation which guarantee that a computer system can remain secure while exhibiting certain desired external characteristics. The rules are easily transformable into algorithms suitable for implementation on a dig
Autor:
Leonard J. LaPadula
This document is a compendium of anomaly detection and reaction (ADR) automated tools and research projects. In the first appendix to this document you will find an explanation of what we mean by anomaly detection and reaction. In the second appendix
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5378902cb3c05a0de0146046e7b49375
https://doi.org/10.21236/ada460206
https://doi.org/10.21236/ada460206
Autor:
James G. Williams, Leonard J. LaPadula
Corporate data communications networks are rapidly becoming major information exchange resources for the companies they serve. They can easily provide the underlying services needed to share unclassified, non sensitive technical and administrative in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::17afbc20cfdd9ad0d99e4bb35077370c
https://doi.org/10.21236/ada277160
https://doi.org/10.21236/ada277160
Autor:
James G. Williams, Leonard J. LaPadula
Publikováno v:
NSPW
Paradigms for information integrity in computer systems have focused in the past on modeling a computer’s internal mechanisms. Biba integrity and recent attempts to “latticize” any computer-based policy are examples. Traditional paradigms for e
Autor:
Leonard J. LaPadula
Publikováno v:
NSPW
This paper examines some of the beginnings of paradigm shifts in computer security. It focuses on formal models of computer security from an historical perspective. Surprisingly perhaps, the historical perspective reveals dramatic shifts. These shift
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.