Next: About this document ...
Up: Integrating Flexible Support for
Previous: To Do
- 1
-
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security
Conference, 1985.
- 2
-
T. Fine and S. E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in
Security and Privacy, pages 206-218, May 1993.
- 3
-
Institute of Electrical and Electronics Engineers, Inc.
Information Technology -- Portable Operating System Interface
(POSIX) -- Part 1: System Application Program Interface (API) [C
Language], 1996.
Std 1003.1, 1996 Edition.
- 4
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner,
and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in
Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security
Conference, pages 303-314, Oct. 1998.
- 5
-
S. E. Minear.
Providing Policy Control Over Object Operations in a Mach Based
System.
In Proceedings of the Fifth USENIX UNIX Security Symposium,
pages 141-156, June 1995.
- 6
-
O. S. Saydjari, J. M. Beckman, and J. R. Leaman.
LOCK Trek: Navigating Uncharted Space.
In Proceedings of the 1989 IEEE Symposium on Security and
Privacy, pages 167-175, 1989.
- 7
-
S. Smalley and T. Fraser.
A Security Policy Configuration for the Security-Enhanced Linux.
Technical report, NAI Labs, Oct. 2000.
- 8
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security
Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages
123-139, Aug. 1999.