Next: About this document ...
Up: Integrating Flexible Support for
Previous: Acknowledgments
- 1
-
Configurable Access Control Effort.
https://research-cistw.saic.com/cace.
- 2
-
Linux Intrusion Detection System.
https://www.lids.org.
- 3
-
Medusa DS9.
https://medusa.fornax.sk.
- 4
-
M. D. Abrams, K. W. Eggers, L. J. L. Padula, and I. M. Olson.
A Generalized Framework for Access Control: An Informal
Description.
In Proceedings of the Thirteenth National Computer Security
Conference, pages 135-143, Oct. 1990.
- 5
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat.
Practical Domain and Type Enforcement for UNIX.
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 66-77, May 1995.
- 6
-
A. D. Balsa.
Linux Benchmarking HOWTO, Aug. 1997.
https://www.linuxdoc.org/HOWTO/Benchmarking-HOWTO.html.
- 7
-
D. E. Bell and L. J. La Padula.
Secure Computer Systems: Mathematical Foundations and Model.
Technical Report M74-244, The MITRE Corporation, Bedford, MA, May
1973.
- 8
-
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security
Conference, 1985.
- 9
-
D. F. C. Brewer and M. J. Nash.
The Chinese Wall security policy.
In Proceedings of the 1989 IEEE Symposium on Security and
Privacy, pages 206-214, May 1989.
- 10
-
D. D. Clark and D. R. Wilson.
A Comparison of Commercial and Military Computer Security Policies.
In Proceedings of the 1987 IEEE Symposium on Security and
Privacy, pages 184-194, Apr. 1987.
- 11
-
D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security
Conference, pages 554-563, Oct. 1992.
- 12
-
T. Fine and S. E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in
Security and Privacy, pages 206-218, May 1993.
- 13
-
T. Fraser.
LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
In Proceedings of the 2000 IEEE Symposium on Security and
Privacy, May 2000.
- 14
-
J. Gilmore.
FreeSWAN.
https://www.freeswan.org.
- 15
-
S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase and Conference,
Oct. 2000.
- 16
-
P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux
Operating System.
Technical report, NSA and NAI Labs, Oct. 2000.
- 17
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner,
and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in
Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security
Conference, pages 303-314, Oct. 1998.
- 18
-
L. McVoy and C. Staelin.
lmbench 2.
https://www.bitmover.com/lmbench.
- 19
-
MindCraft.
Webstone.
https://www.mindcraft.com/webstone.
- 20
-
S. E. Minear.
Providing Policy Control Over Object Operations in a Mach Based
System.
In Proceedings of the Fifth USENIX UNIX Security Symposium,
pages 141-156, June 1995.
- 21
-
D. C. Niemi.
Unixbench 4.1.0.
https://www.tux.org/pub/tux/niemi/unixbench.
- 22
-
A. Ott.
Rule Set Based Access Control as proposed in the Generalized
Framework for Access Control approach in Linux.
Master's thesis, University of Hamburg, Nov. 1997.
pp. 157. https://www.rsbac.org/papers.htm.
- 23
-
Secure Computing Corp.
DTOS Formal Security Policy Model.
DTOS CDRL A004, 2675 Long Lake Rd, Roseville, MN 55113, Sept. 1996.
https://www.securecomputing.com/randt/HTML/dtos.html.
- 24
-
Secure Computing Corp.
DTOS Generalized Security Policy Specification.
DTOS CDRL A019, 2675 Long Lake Rd, Roseville, MN 55113, June 1997.
- 25
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security
Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages
123-139, Aug. 1999.
- 26
-
K. W. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and
K. A. Oostendorp.
Confining Root Programs with Domain and Type Enforcement.
In Proceedings of the 6th Usenix Security Symposium, San Jose,
California, 1996.
- 27
-
R. Watson.
Introducing Supporting Infrastructure for Trusted Operating System
Support in FreeBSD.
In Proceedings of the 2000 BSD Conference and Expo, Oct.
2000.
- 28
-
R. Watson.
Robert Watson on FreeBSD and TrustedBSD, Jan. 2001.
https://slashdot.org/interviews/01/01/18/1251257.shtml.
Stephen D. Smalley
2001-04-26