Proceedings Seventh Annual Computer Security Applications Conference最新文献

筛选
英文 中文
Verification of the security of a secure network component 验证安全网络组件的安全性
Proceedings Seventh Annual Computer Security Applications Conference Pub Date : 1991-12-02 DOI: 10.1109/CSAC.1991.213011
Edward A. Schneider
{"title":"Verification of the security of a secure network component","authors":"Edward A. Schneider","doi":"10.1109/CSAC.1991.213011","DOIUrl":"https://doi.org/10.1109/CSAC.1991.213011","url":null,"abstract":"The author formally proves using a mechanical verifier that a security multiplexer for a network is secure and has no timing channels. While this multiplexer is only a small piece of a system, it handles multiple security levels and contains a process and two procedures that interact with other parts of the system. Security is expressed using an information flow model, extended to handle time. He shows how the multiplexer is specified in this model, describes the synchronous deterministic security model used, and discuss the security proof.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An implementation of access control using a salient feature of primes 一种使用质数显著特征的访问控制实现
Proceedings Seventh Annual Computer Security Applications Conference Pub Date : 1991-12-02 DOI: 10.1109/CSAC.1991.213018
D. A. Moir
{"title":"An implementation of access control using a salient feature of primes","authors":"D. A. Moir","doi":"10.1109/CSAC.1991.213018","DOIUrl":"https://doi.org/10.1109/CSAC.1991.213018","url":null,"abstract":"A method of implementing access control for computer resources is presented, along with examples and possible enhancements. An appropriate application for such resource control can be found in computer operating systems. Thus, the need for resource control is described first, followed by descriptions of some common implementations and the impetus for their development. In light of this discussion, the alternative implementation proposed is presented, followed by a discussion of what improvements over the classical implementations are offered. This done, a series of possible extensions are presented.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A distributed implementation of the extended schematic protection model 扩展原理图保护模型的分布式实现
Proceedings Seventh Annual Computer Security Applications Conference Pub Date : 1991-12-02 DOI: 10.1109/CSAC.1991.213009
P. Ammann, R. Sandhu, Gurpreet S. Suri
{"title":"A distributed implementation of the extended schematic protection model","authors":"P. Ammann, R. Sandhu, Gurpreet S. Suri","doi":"10.1109/CSAC.1991.213009","DOIUrl":"https://doi.org/10.1109/CSAC.1991.213009","url":null,"abstract":"Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117308478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Rebus passwords 煮过的密码
Proceedings Seventh Annual Computer Security Applications Conference Pub Date : 1900-01-01 DOI: 10.1109/CSAC.1991.213000
Maria M. King
{"title":"Rebus passwords","authors":"Maria M. King","doi":"10.1109/CSAC.1991.213000","DOIUrl":"https://doi.org/10.1109/CSAC.1991.213000","url":null,"abstract":"The paper discusses a mechanism to aid users in the memorization of randomly generated nonsense passwords. The mechanism uses association and pictures and is based on techniques that have long been used as a means of memorizing information. The motivation for this work is the increased need to make passwords more difficult to guess and the necessity to keep them easy to remember. This mechanism makes an existing mechanism user-friendly, an area of computer security often ignored.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信