skip to main content
10.1145/304851.304866acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

Developing and using a “policy neutral” access control policy

Authors Info & Claims
Published:17 September 1996Publication History
First page image

References

  1. 1.MartLn Abadi and Leslie Lamp~tt. Composing Specifications. ACM Transactions on Programming Languages and Systems, 15(I):73-132, January 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Marshall D. Abrams, Kenneth W. Eggers, Leonard J. La Padula, and Ingrid M. Olson. A Generalized Framework for Access Control: An Informal Description. In 13th National Computer Security Conference, pages 135-- 143, Washington, D.C., October 1990.Google ScholarGoogle Scholar
  3. 3.W. E. Boebert and R. Y. Kain. A practical alternative to hierarchical integrity policies. In Proceedings 8th National Computer Security Conference, pages 18-27, Gaithersburg, ME), October 1985.Google ScholarGoogle Scholar
  4. 4.David E C. Brewer and bfiehael J. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, pages 206--214, Oakland, CA, May 1989.Google ScholarGoogle Scholar
  5. 5.David D. Clark and David R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.Google ScholarGoogle Scholar
  6. 6.Todd Fine. A Framework for Composition. In Proceedings of the Eleventh Annual Conference on Computer Assurance, pages 199-212, Gaithersburg, Maryland, June 1996.Google ScholarGoogle Scholar
  7. 7.Todd Fine and Spencer E. Minear. Assuring Distributed Trusted Math. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 206--218, Oakland, CA, May 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Hilary H. Hosmer. Metapolicies 11. In 15thNational Computer Security Conference, pages 369-378, Baltimore, MD, october 1992.Google ScholarGoogle Scholar
  9. 9.Hilary H. Hosmer. The Multipolicy Paradigm. In 15th National Computer Security Conference, pages 409--422, Baltimore, ME), October 1992.Google ScholarGoogle Scholar
  10. 10.Catherine Jensen McCollum, Judith R. Messing, and LouAnna Notargiacomo. Beyond the pale of MAC and DAC- defining new forms of access control. In IEEE Symposium on Security and Privacy, pages 190-200, Oakland, CA, May 1990.Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.Spencer E. Minear. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the Fifih USE2VIX UNIX Security Symposium, pages 141-156, Salt Lake City, Utah, June 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.NCSC. Trusted Computer Systems Evaluation Criteria. Standard, DOD 5200.28-STD, US National Computer Security Center, Fort George G. Meade, Ma~land 20755-6000, December 1985.Google ScholarGoogle Scholar
  13. 13.John Page,Jody Heanoy, Marc Adkins, and Gary Dolsen. Evaluation of Security Model Rule Bases. In 12th National Computer Security Conference, pages 98-111, Baltimore, MD, october 1989.Google ScholarGoogle Scholar
  14. 14.Secure Computing Corporation. DTOS Generalized Security Policy Specification. Technical report, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113-2536, January 1995. DTOS CDRL A019.Google ScholarGoogle Scholar
  15. 15.N. Shankar. A lazy approach to compositional verification. Technical Report TSL-93-08, SKI International, December 1993.Google ScholarGoogle Scholar
  16. 16.J.M. Spivey. The Z Notation: A Reference Manual. Prentice Hall International, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Bruce J. Walker, Richard A. Kemmerer, and Gerald J. PopeL Specification and Verification of the UCLA Unix Security Kernel. Communications of the ACM, 23(2): 118-131, February 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Developing and using a “policy neutral” access control policy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NSPW '96: Proceedings of the 1996 workshop on New security paradigms
            September 1996
            153 pages
            ISBN:0897919440
            DOI:10.1145/304851

            Copyright © 1996 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 September 1996

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate62of170submissions,36%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader