hrcak mascot   Srce   HID

Izvorni znanstveni članak

Modeling Trusted Processing Architectures for Mandatory Access Control

Thomas H. Hinke ; Computer Science Department, University of Alabama in Huntsville, Huntsville, U.S.A.

Puni tekst: engleski, pdf (9 MB) str. 67-82 preuzimanja: 41* citiraj
APA 6th Edition
H. Hinke, T. (1995). Modeling Trusted Processing Architectures for Mandatory Access Control. Journal of computing and information technology, 3 (2), 67-82. Preuzeto s https://hrcak.srce.hr/150429
MLA 8th Edition
H. Hinke, Thomas. "Modeling Trusted Processing Architectures for Mandatory Access Control." Journal of computing and information technology, vol. 3, br. 2, 1995, str. 67-82. https://hrcak.srce.hr/150429. Citirano 19.07.2019.
Chicago 17th Edition
H. Hinke, Thomas. "Modeling Trusted Processing Architectures for Mandatory Access Control." Journal of computing and information technology 3, br. 2 (1995): 67-82. https://hrcak.srce.hr/150429
Harvard
H. Hinke, T. (1995). 'Modeling Trusted Processing Architectures for Mandatory Access Control', Journal of computing and information technology, 3(2), str. 67-82. Preuzeto s: https://hrcak.srce.hr/150429 (Datum pristupa: 19.07.2019.)
Vancouver
H. Hinke T. Modeling Trusted Processing Architectures for Mandatory Access Control. Journal of computing and information technology [Internet]. 1995 [pristupljeno 19.07.2019.];3(2):67-82. Dostupno na: https://hrcak.srce.hr/150429
IEEE
T. H. Hinke, "Modeling Trusted Processing Architectures for Mandatory Access Control", Journal of computing and information technology, vol.3, br. 2, str. 67-82, 1995. [Online]. Dostupno na: https://hrcak.srce.hr/150429. [Citirano: 19.07.2019.]

Sažetak
This paper introduces a trusted architecture graph (TAG) model, which can be used for modeling the semantics of trusted architectures designed to enforce mandatory access control. The TAG permits the modeling of various types of trusted functions, storage functions and processing functions and their interconnection through various types of links. The value of the TAG and the associated TAG notation is that they provide a uniform way of representing different trusted architectures that may be described either informally in a natural ll.lnguage, or formally (but voluminously) described in design documents or programming code. By providing a concise yet expressive description of the architecture, the various features of one architecture can be readily compared with another's. This paper provides some examples that illustrate how various trusted database management system architectures can be formulated in the TAG notation such that their significant differences can be readily observed.

Ključne riječi
Computer Security; Security Architectures Modeling

Hrčak ID: 150429

URI
https://hrcak.srce.hr/150429

Posjeta: 70 *