- 1.Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Trans. on Programming Languages and Systems ~5(4): 706-734, September 1993. Google ScholarDigital Library
- 2.Defense Information Systems Agency, Center for Standards. Department of Defense (DoD) Goal Security Architecture (DGSA), Version 3.0, April 1996. Volume 6 of Department of Defense Technical Architecture Framework for Information Management (TAFIM).Google Scholar
- 3.Edward A. Feustel and Terry Mayfield. The DGSA: Unmet security challenges for operating system designers. Operating Systems Review 32(1): 3-22, January 1998. Google ScholarDigital Library
- 4.David Garlan and Mary Shaw. An introduction to software architecture. In Advances in Software Engineering and Knowledge Engineering, edited by V. Ambriola and G. Tortora, World Scientific Publishing Company, 1993.Google Scholar
- 5.Steven J. Greenwald. A new security policy for distributed resource management and access control. In Proceedings of the New Security Paradigms Workshop, pages 74-86, Lake Arrowhead, CA, September 1996. Google ScholarDigital Library
- 6.Tom Lowman and Douglas Mosier. Applying the DoD Goal Security Architecture as a methodology for the development of system and enterprise security architectures, lnProceedings of the Thirteenth Annual Computer Security Applications Conference, pages 183-I93, San Diego, CA, IEEE Computer Society, December 1997. Google ScholarDigital Library
- 7.Duane Olawsky, Todd Fine, Edward Schneider, and Ray Spencer. Developing and using a "policy neutral" access control policy. In Proceedings of the New Security Paradigms Workshop, pages 60-67, Lake Arrowhead, CA, September 1996. Google ScholarDigital Library
- 8.Edward A. Schneider, Edward A. Feustel, and Ronald S. Ross. Assessing DoD Goal Security Architecture (DGSA) Support in Commercially Available Operating Systems and Hardware Platforms. IDA Paper P-3375, November 1997.Google Scholar
Index Terms
- Security architecture-based system design
Recommendations
Understanding security architecture
SpringSim '08: Proceedings of the 2008 Spring simulation multiconferenceThis paper is an attempt to explain and understand what security architecture means and represents. A starting point was to include all elements of security architecture such as: network, host-based, applications, information, software, hardware, ...
Security Architecture of Computer Communication System Based on Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyIn large-scale service collaboration environment, security and privacy protection are the main factors affecting the development of IoT service applications. The security and privacy requirements of IoT services mainly focus on three aspects: secure ...
Refereed paper: Policy Groups
This paper contributes to the current discussion on multipolicy systems: systems that support a multitude of independent security domains in which an individual security policy is enforced on the applications. In multipolicy systems, the ...
Comments