1975
DOI: 10.1109/proc.1975.9939
|View full text |Cite
|
Sign up to set email alerts
|

The protection of information in computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
614
0
6

Year Published

2000
2000
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 1,576 publications
(655 citation statements)
references
References 50 publications
2
614
0
6
Order By: Relevance
“…A number of basic principles and security engineering notions come into play. Among these are the ordering of security dependencies, the ordering of trust and trustworthiness [45], and the principle of least privilege [65] as manifested in the organization of components that enforce or support the enforcement of policy, as well as components that are trusted with respect to policy.…”
Section: High Assurance Allocation Of Policymentioning
confidence: 99%
“…A number of basic principles and security engineering notions come into play. Among these are the ordering of security dependencies, the ordering of trust and trustworthiness [45], and the principle of least privilege [65] as manifested in the organization of components that enforce or support the enforcement of policy, as well as components that are trusted with respect to policy.…”
Section: High Assurance Allocation Of Policymentioning
confidence: 99%
“…The main capability-system design rule, the principle of least authority (sometimes called the "principle of least privilege" [31]) requires one to design interfaces such that authority is handed out only on a need-to-do basis [6].…”
Section: Six Perspectivesmentioning
confidence: 99%
“…Access control is the most primary means on the data protection [2]. But, it are mainly applicable to single control domain, and so are not suitable for cloud computing, where the owners and processors of the data usually belong to various control domains and the owners will lost the control to their data once their data migrates to other control domains.…”
Section: Introductionmentioning
confidence: 99%