Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Marshall D. Abrams"'
Publikováno v:
Computers & Security. 14:147-157
This paper views the Reference Monitor in a new framework that makes it possible to generalize from passive to active monitors. It describes a major trend in the evolution of information systems security. The concepts are a practical reflection of re
Autor:
Marshall D. Abrams, Michael V. Joyce
Publikováno v:
Computers & Security. 14:57-68
This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongo
Autor:
Michael V. Joyce, Marshall D. Abrams
Publikováno v:
Computers & Security. 14:69-81
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access cont
Publikováno v:
Computers & Security. 14:719-738
In developing information technology, you want assurance that systems are secure and reliable, but you cannot have assurance or security without correctness. We discuss methods used to achieve correctness, focusing on weaknesses and approaches that m
Autor:
Michael V. Joyce, Marshall D. Abrams
Publikováno v:
Computers & Security. 14:45-56
This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitate a
Autor:
Edward G. Amoroso, Leonard J. LaPadula, Marshall D. Abrams, Teresa F. Lunt, James G. Williams
Publikováno v:
Computers & Security. 12:679-689
This paper describes issues and results obtained in the context of an integrity research study group. A specification and modeling taxonomy is shown to provide a framework for the group's integrity discussions and investigations. In particular, the C
Autor:
Ingrid M. Olson, Marshall D. Abrams
Publikováno v:
Computers & Security. 9:699-714
This paper provides a guide-a road map-for refining a high-level information dissemination/control policy into an implementable access control policy. This process involves determining the appropriate set of policy-oriented limitations and can take p
Publikováno v:
COTS-Based Software Systems ISBN: 9783540219033
ICCBSS
ICCBSS
Large systems are typically composed of multiple hardware and software components. Most of the components are Commercial Off The Shelf (COTS) products. All of the COTS components have security properties, as will the custom software, and the resultan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::21a7a3061c248922c997a569fee3e44e
https://doi.org/10.1007/978-3-540-24645-9_14
https://doi.org/10.1007/978-3-540-24645-9_14
Autor:
Mark Joseph, Marshall D. Abrams
Publikováno v:
SAE Technical Paper Series.
Autor:
Marshall D. Abrams
Publikováno v:
Workshop on New Security Paradigms