next up previous
Next: About this document ... Up: The Rule Set Based Previous: Outlook

Bibliography

Abrams+90
Abrams, M. D., Eggers, K. W., La Padula, L. J., Olson, I. M., A Generalized Framework for Access Control: An Informal Description, Proceedings of the 13th National Computer Security Conference, Oktober 1990

CU
Brauch, K., Ott, A., Compuniverse Homepage, http://www.compuniverse.de

EU95
Directive 95/46/EC of the European Parliament and of the Council, On the protection of individuals with regard to the processing of personal data and on the free movement of such data, Brussels, 1995

FiHue97
Fischer-Hübner, S., A Formal Task-based Privacy Model and its Implementation: An updated Report, Second Nordic Workshop on Secure Computer Systems (NORDSEC'97), Helsinki, 1997

FiHueOtt98
Fischer-Hübner, S., Ott, A., From a Formal Privacy Model to its Implementation, Proceedings of the 21st National Information Systems Security Conference (NISSC '98), Arlington, VA, 1998, http://www.rsbac.org/niss98.htm

LaPadula95
La Padula, L. J., Rule Set Modeling of a Trusted Computer System, Essay, in: Information Security: An Integrated Collection of Essays, Hrsg.: Abrams, M. D., Jajodia, S., Podell, H. J., IEEE Computer Society Press, 1995

OttFiSwi98
Ott, A., Fischer-Hübner, S., Swimmer, M., Approaches to Integrated Malware Detection and Avoidance", Proceedings of the 3rdNordic Workshop on Secure IT Systems, Trondheim, November 5-6, 1998, http://www.rsbac.org/nordse98.htm

Ott2001
Ott, A., "Rule Set Based Access Control (RSBAC)", Snow Unix Event / unix.nl congress "Reliable Internet", Waardenburg, 14th of September 2001 http://www.rsbac.org/unix-nl/

RSBAC
Ott, A., RSBAC Homepage, http://www.rsbac.org


2001-12-03