 
 
 
 
 
 
   
 Next: About this document ...
 Up: LOMAC: MAC You Can
 Previous: Acknowledgements
-  
- 1
- 
J. P. Anderson.
 Computer Security Technology Planning Study.
 Technical Report ESD-TR-73-51, USAF Electronic Systems Division,
  Hanscom Air Force Base, Bedford, Massachusetts, October 1972.
- 2
- 
Argus Systems Inc.
 Pitbull LX.
 https://www.argus-systems.com/products/white_paper/lx/.
- 3
- 
L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker.
 A Domain and Type Enforcement UNIX Prototype.
 USENIX Computing Systems, 9(1):47-83, Winter 1996.
- 4
- 
M. Beattie.
 MAC.
 https://users.ox.ac.uk/ mbeattie/linux.
- 5
- 
K. J. Biba.
 Integrity Considerations for Secure Computer Systems.
 Technical Report ESD-TR-76-372, USAF Electronic Systems Division,
  Hanscom Air Force Base, Bedford, Massachusetts, April 1977.
- 6
- 
W. E. Boebert and R. Y. Kain.
 A Practical Alternative to Hierarchical Integrity Policies.
 In Proceedings of the 8th National Computer Security
  Conference, pages 18-27, Gaithersburg, Maryland, September 1985.
- 7
- 
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor.
 SubDomain: Parsimonious Server Security.
 In Proceedings of the 14th USENIX Systems Administration
  Conference (LISA 2000), New Orleans, LA, December 2000.
- 8
- 
D. Ferraiolo and R. Kuhn.
 Role-Based Access Controls.
 In Proceedings of the 15th National Computer Security
  Conference, pages 554-563, Baltimore, Maryland, October 1992.
- 9
- 
T. Fraser.
 LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
 In Proceedings of the 2000 IEEE Symposium on Security and
  Privacy, pages 230-245, Berkeley, California, May 2000.
- 10
- 
T. Fraser, L. Badger, and M. Feldman.
 Hardening COTS Software with Generic Software Wrappers.
 In Proceedings of the 1999 IEEE Symposium on Security and
  Privacy, pages 2-16, Berkeley, California, May 1999.
- 11
- 
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson.
 SLIC: An Extensibility System for Commodity Operating Systems.
 In Proceedings of the USENIX 1998 Annual Technical Conference,
  New Orleans, Louisiana, June 1998.
- 12
- 
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer.
 A Secure Environment for Untrusted Helper Applications.
 In Proceedings of the 6th USENIX Security Symposium, pages
  1-13, San Jose, California, July 1996.
- 13
- 
S. Hallyn and P. Kearns.
 Domain and Type Enforcement for Linux.
 In Proceedings of the 4th Annual Linux Showcase & Conference
  (ALS 2000), Atlanta, Georgia, October 2000.
- 14
- 
U. InteS, Odessa.
 VXE.
 https://www.intes.odessa.ua/vxe.
- 15
- 
T. M. P. Lee.
 Using Mandatory Integrity to Enforce ``Commercial'' Security.
 In Proceedings of the 1988 IEEE Symposium on Security and
  Privacy, pages 140-146, Oakland, California, April 1988.
- 16
- 
S. B. Lipner.
 Non-Discretionary Controls for Commercial Applications.
 In Proceedings of the 1982 IEEE Symposium on Security and
  Privacy, pages 2-10, Oakland, California, April 1982.
- 17
- 
P. A. Loscocco and S. D. Smalley.
 Integrating Flexible Support for Security Policies into the Linux
  Operating System.
 In Proceedings of the FREENIX Track: USENIX Annual Technical
  Conference, June 2001.
- 18
- 
E. J. McCauley and P. J. Drongowski.
 KSOS - The Design of a Secure Operating System.
 In Proceedings of the National Computer Conference, Vol. 48,
  AFIPS Press, pages 345-353, Montvale, New Jersey, 1979.
- 19
- 
M. D. McIlroy and J. A. Reeds.
 Multilevel security with fewer fetters.
 In Proceedings of the USENIX UNIX Security Workshop, pages
  24-31, August 1988.
- 20
- 
T. Mitchem, R. Lu, and R. O'Brien.
 Using Kernel Hypervisors to Secure Applications.
 In Proceedings of the 13th Annual Computer Security Applications
  Conference, San Diego, California, December 1997.
- 21
- 
A. G. Morgan.
 linux-privs.
 https://www.kernel.org/ pub/linux/libs/security/linux-privs/old/doc.
- 22
- 
A. Ott.
 Regel-basierte Zugriffskontrolle nach dem Generalized Framework for
  Access Control-Ansatz am Beispiel Linux.
 Master's thesis, Universitat Hamburg, Fachbereich Informatik, 1997.
- 23
- 
G. J. Popek, M. Kampe, C. S. Kline, A. Stoughton, M. Urban, and E. J. Walton.
 UCLA Secure UNIX.
 In Proceedings of the National Computer Conference, Vol. 48,
  AFIPS Press, pages 355-364, Montvale, New Jersey, 1979.
- 24
- 
SAIC.
 SAIC DTE.
 https://research-cistw.saic.com/ cace/dte.html.
- 25
- 
J. H. Saltzer and M. D. Schroder.
 The Protection of Information in Computer Systems.
 In Proceedings of the IEEE Vol. 63(9), pages 1278-1308,
  September 1975.
- 26
- 
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
 The Flask Security Architecture: System Support for Diverse Security
  Policies.
 In Proceedings of the 8th USENIX Security Symposium, pages
  123-139, Washington, DC, August 1999.
- 27
- 
R. Watson.
 TrustedBSD: Adding Trusted Operating System Features to FreeBSD.
 In Proceedings of the FREENIX Track: USENIX Annual Technical
  Conference, June 2001.
- 28
- 
H. Xie and P. Biondi.
 LIDS.
 https://www.lids.org.
- 29
- 
M. Zelem, M. Pikula, and M. Ockajak.
 Medusa DS9.
 https://medusa.fornax.sk.
2001-04-30