Information Technology Reference
In-Depth Information
References
1. Claycomb, W.R., Shin, D.: Detecting insider activity using enhanced directory
virtualization. In: Proceedings of the 2010 ACM Workshop on Insider Threats,
pp. 29-36. ACM (2010)
2. Hirano, M., Shinagawa, T., Eiraku, H., Hasegawa, S., Omote, K., Tanimoto, K.,
Horie, T., Kato, K., Okuda, T., Kawai, E.: Introducing role-based access con-
trol to a secure virtual machine monitor: security policy enforcement mechanism
for distributed computers. In: IEEE Asia-Pacific Services Computing Conference,
APSCC 2008, pp. 1225-1230. IEEE (2008)
3. Madnick, S.E., Donovan, J.J.: Application and analysis of the virtual machine ap-
proach to information system security and isolation. In: Proceedings of the Work-
shop on Virtual Computer Systems, pp. 210-224. ACM (1973)
4. Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Grin, J.L.,
van Doorn, L.: Building a MAC-based security architecture for the Xen open-
source hypervisor. In: 21st Annual Computer Security Applications Conference,
pp. 276-285. IEEE (2005)
5. Meushaw, R., Simard, D.: NetTop: Commercial technology in high assurance ap-
plications. Tech. Trend Notes: Preview of Tomorrow's Information Technologies 9
(2000)
6. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual
machine-based platform for trusted computing. In: ACM SIGOPS Operating Sys-
tems Review, pp. 193-206. ACM (2003)
7. Liu, Q., Wang, G., Weng, C., Luo, Y., Li, M.: A Mandatory Access Control Frame-
work in Virtual Machine System with Respect to Multi-level Security I: Theory.
China Communications 7, 137-143 (2010)
8. Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for
enforcing multiple access control policies. In: ACM Sigmod Record, pp. 474-485.
ACM (1997)
9. Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. arXiv preprint
arXiv:0903.2171 (2009)
10. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control:
towards a unified standard. In: Symposium on Access Control Models and Tech-
nologies: Proceedings of the Fifth ACM Workshop on Role-Based Access Control,
pp. 47-63 (2000)
11. Sun, Y., Wang, Q., Li, N., Bertino, E., Atallah, M.J.: On the complexity of autho-
rization in RBAC under qualification and security constraints. IEEE Transactions
on Dependable and Secure Computing 8, 883-897 (2011)
12. Wang, X., Gu, T., Guo, Y., Zheng, Y., Zong, J., Gong, B.: An Algorithm for Role
Mapping Across Multi-domains Employing RBAC. Chinese Journal of Electron-
ics 18 (2009)
13. Fan, B., Liang, X., Luo, Y., Bo, Y., Xia, C.: Conflict Detection Model of Access
Control Policy in Collaborative Environment. In: 2011 International Conference on
Computational and Information Sciences (ICCIS), pp. 377-381. IEEE (2011)
Search WWH ::




Custom Search