skip to main content
10.1145/335169.335185acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

Security architecture-based system design

Published:01 September 1999Publication History
First page image

References

  1. 1.Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Trans. on Programming Languages and Systems ~5(4): 706-734, September 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Defense Information Systems Agency, Center for Standards. Department of Defense (DoD) Goal Security Architecture (DGSA), Version 3.0, April 1996. Volume 6 of Department of Defense Technical Architecture Framework for Information Management (TAFIM).Google ScholarGoogle Scholar
  3. 3.Edward A. Feustel and Terry Mayfield. The DGSA: Unmet security challenges for operating system designers. Operating Systems Review 32(1): 3-22, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.David Garlan and Mary Shaw. An introduction to software architecture. In Advances in Software Engineering and Knowledge Engineering, edited by V. Ambriola and G. Tortora, World Scientific Publishing Company, 1993.Google ScholarGoogle Scholar
  5. 5.Steven J. Greenwald. A new security policy for distributed resource management and access control. In Proceedings of the New Security Paradigms Workshop, pages 74-86, Lake Arrowhead, CA, September 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Tom Lowman and Douglas Mosier. Applying the DoD Goal Security Architecture as a methodology for the development of system and enterprise security architectures, lnProceedings of the Thirteenth Annual Computer Security Applications Conference, pages 183-I93, San Diego, CA, IEEE Computer Society, December 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Duane Olawsky, Todd Fine, Edward Schneider, and Ray Spencer. Developing and using a "policy neutral" access control policy. In Proceedings of the New Security Paradigms Workshop, pages 60-67, Lake Arrowhead, CA, September 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Edward A. Schneider, Edward A. Feustel, and Ronald S. Ross. Assessing DoD Goal Security Architecture (DGSA) Support in Commercially Available Operating Systems and Hardware Platforms. IDA Paper P-3375, November 1997.Google ScholarGoogle Scholar

Index Terms

  1. Security architecture-based system design

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  NSPW '99: Proceedings of the 1999 workshop on New security paradigms
                  September 1999
                  140 pages
                  ISBN:1581131496
                  DOI:10.1145/335169

                  Copyright © 1999 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 September 1999

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate62of170submissions,36%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader