Next: About this document ... Up:
Rule Set Based Access Previous: Outlook
-
- Abrams+90
- Abrams, M. D., Eggers, K. W., La Padula, L. J., Olson, I. M., A Generalized Framework
for Access Control: An Informal Description, Proceedings of the 13th National Computer
Security Conference, Oktober 1990
- CU
- Brauch, K., Ott, A., Compuniverse Homepage, http://www.compuniverse.de
- EU95
- Directive 95/46/EC of the European Parliament and of the Council, On the protection of
individuals with regard to the processing of personal data and on the free movement of
such data, Brussels, 1995
- FiHue97
- Fischer-Hübner, S., A Formal Task-based Privacy Model and its Implementation: An
updated Report, Second Nordic Workshop on Secure Computer Systems (NORDSEC'97), Helsinki,
1997
- FiHueOtt98
- Fischer-Hübner, S., Ott, A., From a Formal Privacy Model to its Implementation,
Proceedings of the 21st National Information Systems Security Conference (NISSC '98),
Arlington, VA, 1998, http://www.rsbac.org/niss98.htm
- LaPadula95
- La Padula, L. J., Rule Set Modeling of a Trusted Computer System, Essay, in: Information
Security: An Integrated Collection of Essays, Hrsg.: Abrams, M. D., Jajodia, S., Podell,
H. J., IEEE Computer Society Press, 1995
- OttFiSwi98
- Ott, A., Fischer-Hübner, S., Swimmer, M., Approaches to Integrated Malware Detection
and Avoidance", Proceedings of the 3rdNordic Workshop on Secure IT Systems,
Trondheim, November 5-6, 1998, http://www.rsbac.org/nordse98.htm
- RSBAC
- Ott, A., RSBAC Homepage, http://www.rsbac.org
2001-09-17