Check out the new USENIX Web site. next up previous
Next: About this document ... Up: LOMAC: MAC You Can Previous: Acknowledgements

Bibliography

1
J. P. Anderson.
Computer Security Technology Planning Study.
Technical Report ESD-TR-73-51, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, October 1972.

2
Argus Systems Inc.
Pitbull LX.
https://www.argus-systems.com/products/white_paper/lx/.

3
L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker.
A Domain and Type Enforcement UNIX Prototype.
USENIX Computing Systems, 9(1):47-83, Winter 1996.

4
M. Beattie.
MAC.
https://users.ox.ac.uk/ mbeattie/linux.

5
K. J. Biba.
Integrity Considerations for Secure Computer Systems.
Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, April 1977.

6
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the 8th National Computer Security Conference, pages 18-27, Gaithersburg, Maryland, September 1985.

7
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor.
SubDomain: Parsimonious Server Security.
In Proceedings of the 14th USENIX Systems Administration Conference (LISA 2000), New Orleans, LA, December 2000.

8
D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security Conference, pages 554-563, Baltimore, Maryland, October 1992.

9
T. Fraser.
LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 230-245, Berkeley, California, May 2000.

10
T. Fraser, L. Badger, and M. Feldman.
Hardening COTS Software with Generic Software Wrappers.
In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 2-16, Berkeley, California, May 1999.

11
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson.
SLIC: An Extensibility System for Commodity Operating Systems.
In Proceedings of the USENIX 1998 Annual Technical Conference, New Orleans, Louisiana, June 1998.

12
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer.
A Secure Environment for Untrusted Helper Applications.
In Proceedings of the 6th USENIX Security Symposium, pages 1-13, San Jose, California, July 1996.

13
S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase & Conference (ALS 2000), Atlanta, Georgia, October 2000.

14
U. InteS, Odessa.
VXE.
https://www.intes.odessa.ua/vxe.

15
T. M. P. Lee.
Using Mandatory Integrity to Enforce ``Commercial'' Security.
In Proceedings of the 1988 IEEE Symposium on Security and Privacy, pages 140-146, Oakland, California, April 1988.

16
S. B. Lipner.
Non-Discretionary Controls for Commercial Applications.
In Proceedings of the 1982 IEEE Symposium on Security and Privacy, pages 2-10, Oakland, California, April 1982.

17
P. A. Loscocco and S. D. Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
In Proceedings of the FREENIX Track: USENIX Annual Technical Conference, June 2001.

18
E. J. McCauley and P. J. Drongowski.
KSOS - The Design of a Secure Operating System.
In Proceedings of the National Computer Conference, Vol. 48, AFIPS Press, pages 345-353, Montvale, New Jersey, 1979.

19
M. D. McIlroy and J. A. Reeds.
Multilevel security with fewer fetters.
In Proceedings of the USENIX UNIX Security Workshop, pages 24-31, August 1988.

20
T. Mitchem, R. Lu, and R. O'Brien.
Using Kernel Hypervisors to Secure Applications.
In Proceedings of the 13th Annual Computer Security Applications Conference, San Diego, California, December 1997.

21
A. G. Morgan.
linux-privs.
https://www.kernel.org/ pub/linux/libs/security/linux-privs/old/doc.

22
A. Ott.
Regel-basierte Zugriffskontrolle nach dem Generalized Framework for Access Control-Ansatz am Beispiel Linux.
Master's thesis, Universitat Hamburg, Fachbereich Informatik, 1997.

23
G. J. Popek, M. Kampe, C. S. Kline, A. Stoughton, M. Urban, and E. J. Walton.
UCLA Secure UNIX.
In Proceedings of the National Computer Conference, Vol. 48, AFIPS Press, pages 355-364, Montvale, New Jersey, 1979.

24
SAIC.
SAIC DTE.
https://research-cistw.saic.com/ cace/dte.html.

25
J. H. Saltzer and M. D. Schroder.
The Protection of Information in Computer Systems.
In Proceedings of the IEEE Vol. 63(9), pages 1278-1308, September 1975.

26
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the 8th USENIX Security Symposium, pages 123-139, Washington, DC, August 1999.

27
R. Watson.
TrustedBSD: Adding Trusted Operating System Features to FreeBSD.
In Proceedings of the FREENIX Track: USENIX Annual Technical Conference, June 2001.

28
H. Xie and P. Biondi.
LIDS.
https://www.lids.org.

29
M. Zelem, M. Pikula, and M. Ockajak.
Medusa DS9.
https://medusa.fornax.sk.



2001-04-30