 
 
 
 
 
 
   
 Next: About this document ...
 Up: Analyzing Integrity Protection in
 Previous: Acknowledgements
 
 - 
 
- 1
- 
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat.
 A Domain and Type Enforcement UNIX Prototype.
 In Proceedings of the 1995 USENIX Security Symposium, 1995.
 Also available from TIS online archives.
 
- 2
- 
D. Bell and L. La Padula.
 Secure Computer Systems: Mathematical Foundations (Volume 1).
 Technical Report ESD-TR-73-278, Mitre Corporation, 1973.
 
- 3
- 
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca.
 A logical framework for reasoning about access control models.
 ACM Transactions on Information and System Security (TISSEC),
  5(4), Nov 2002.
 
- 4
- 
K. J. Biba.
 Integrity considerations for secure computer systems.
 Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA,
  June 1975.
 
- 5
- 
W. E. Boebert and R. Y. Kain.
 A Practical Alternative to Hierarchical Integrity Policies.
 In Proceedings of the 8
National Computer Security
  Conference, Gaithersburg, Maryland, 1985.
 
- 6
- 
D. D. Clark and D. R. Wilson.
 A comparison of commercial and military computer security
          policies.
 Proceedings of the 1987 IEEE Symposium on Security
          and Privacy, 1987.
 
- 7
- 
A. Herzog.
 Personal communication..
 November 2002.
 
- 8
- 
E. Ferrari and B. Thuraisingham.
 Secure database systems.
 In O. Diaz and M. Piattini, editors, Advanced Databases:
  Technology and Design, 2000.
 
- 9
- 
T. Fraser.
 LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
 In Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000.
 
- 10
- 
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman.
 Protection in operating systems.
 Communications of the ACM, 19(8), August 1976.
 
- 11
- 
T. Jaeger and J. E. Tidswell.
 Practical safety in flexible access control models.
 ACM Transactions on Information and System Security (TISSEC),
  4(2), May 2001.
 
- 12
- 
T. Jaeger, A. Edwards, and X. Zhang.
 Managing access control policies using access control spaces.
 In Proceedings of the 
ACM Symposium on Access Control
  Models and Technologies, June 2002.
 
- 13
- 
T. Jaeger, A. Edwards, and X. Zhang.
 Policy management using access control spaces.
 ACM Transactions on Information and System Security (TISSEC), to appear.
 
- 14
- 
S. Jajodia, P. Samarati and V. Subrahmanian.
 A Logical Language for Expressing Authorizations.
 Proceedings of the IEEE Symposium on Security and Privacy, 1997.
 
- 15
- 
P. Karger and R. Schell.
 Thirty years later: Lessons from the Multics security evaluation.
 IBM Technical Report, RC 22534, Revision 2, September 2002.
 
- 16
- 
P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell.
 The inevitability of failure: The flawed assumption of computer security in modern computing environments.
 Proceedings of the 
National Information Systems Security Conference, October 1998.
 
- 17
- 
S. Minear.
 Providing policy control over objects in a Mach-based system.
 Proceedings of the Fifth USENIX Security Symposium, 1995.
 
- 18
- 
National Security Agency.
 Security-Enhanced Linux (SELinux).
 https://www.nsa.gov/selinux, 2001.
 
- 19
- 
W. Salamon.
 Core policy, second pass.
 SELinux mailing list archives, https://www.nsa.gov/selinux/list-archive/3941.html, 2003.
 
- 20
- 
S. Smalley.
 Configuring the SELinux policy.
 NAI Labs Report #02-007, available at www.nsa.gov/selinux, June 2002.
 
- 21
- 
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, and J. Lapreau.
 The Flask security architecture: System support for diverse policies.
 Proceedings of the Eighth USENIX Security Symposium, August 1999.
 
- 22
- 
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman.
 Linux Security Modules: General security support for the Linux kernel.
 Proceedings of the Eleventh USENIX Security Symposium, August 2002.
 
- 23
- 
Tresys Technology.
 Security-Enhanced Linux research.
 www.tresys.com/selinux.html, 2001.
 
Trent Jaeger
2003-05-11