next up previous
Next: About this document ... Up: Rule Set Based Access Previous: Outlook

Bibliography

 
Abrams+90
Abrams, M. D., Eggers, K. W., La Padula, L. J., Olson, I. M., A Generalized Framework for Access Control: An Informal Description, Proceedings of the 13th National Computer Security Conference, Oktober 1990
CU
Brauch, K., Ott, A., Compuniverse Homepage, http://www.compuniverse.de
EU95
Directive 95/46/EC of the European Parliament and of the Council, On the protection of individuals with regard to the processing of personal data and on the free movement of such data, Brussels, 1995
FiHue97
Fischer-Hübner, S., A Formal Task-based Privacy Model and its Implementation: An updated Report, Second Nordic Workshop on Secure Computer Systems (NORDSEC'97), Helsinki, 1997
FiHueOtt98
Fischer-Hübner, S., Ott, A., From a Formal Privacy Model to its Implementation, Proceedings of the 21st National Information Systems Security Conference (NISSC '98), Arlington, VA, 1998, http://www.rsbac.org/niss98.htm
LaPadula95
La Padula, L. J., Rule Set Modeling of a Trusted Computer System, Essay, in: Information Security: An Integrated Collection of Essays, Hrsg.: Abrams, M. D., Jajodia, S., Podell, H. J., IEEE Computer Society Press, 1995
OttFiSwi98
Ott, A., Fischer-Hübner, S., Swimmer, M., Approaches to Integrated Malware Detection and Avoidance", Proceedings of the 3rdNordic Workshop on Secure IT Systems, Trondheim, November 5-6, 1998, http://www.rsbac.org/nordse98.htm
RSBAC
Ott, A., RSBAC Homepage, http://www.rsbac.org




2001-09-17