Next: About this document ...
Up: LOMAC: MAC You Can
Previous: Acknowledgements
-
- 1
-
J. P. Anderson.
Computer Security Technology Planning Study.
Technical Report ESD-TR-73-51, USAF Electronic Systems Division,
Hanscom Air Force Base, Bedford, Massachusetts, October 1972.
- 2
-
Argus Systems Inc.
Pitbull LX.
https://www.argus-systems.com/products/white_paper/lx/.
- 3
-
L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker.
A Domain and Type Enforcement UNIX Prototype.
USENIX Computing Systems, 9(1):47-83, Winter 1996.
- 4
-
M. Beattie.
MAC.
https://users.ox.ac.uk/ mbeattie/linux.
- 5
-
K. J. Biba.
Integrity Considerations for Secure Computer Systems.
Technical Report ESD-TR-76-372, USAF Electronic Systems Division,
Hanscom Air Force Base, Bedford, Massachusetts, April 1977.
- 6
-
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the 8th National Computer Security
Conference, pages 18-27, Gaithersburg, Maryland, September 1985.
- 7
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor.
SubDomain: Parsimonious Server Security.
In Proceedings of the 14th USENIX Systems Administration
Conference (LISA 2000), New Orleans, LA, December 2000.
- 8
-
D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security
Conference, pages 554-563, Baltimore, Maryland, October 1992.
- 9
-
T. Fraser.
LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
In Proceedings of the 2000 IEEE Symposium on Security and
Privacy, pages 230-245, Berkeley, California, May 2000.
- 10
-
T. Fraser, L. Badger, and M. Feldman.
Hardening COTS Software with Generic Software Wrappers.
In Proceedings of the 1999 IEEE Symposium on Security and
Privacy, pages 2-16, Berkeley, California, May 1999.
- 11
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson.
SLIC: An Extensibility System for Commodity Operating Systems.
In Proceedings of the USENIX 1998 Annual Technical Conference,
New Orleans, Louisiana, June 1998.
- 12
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer.
A Secure Environment for Untrusted Helper Applications.
In Proceedings of the 6th USENIX Security Symposium, pages
1-13, San Jose, California, July 1996.
- 13
-
S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase & Conference
(ALS 2000), Atlanta, Georgia, October 2000.
- 14
-
U. InteS, Odessa.
VXE.
https://www.intes.odessa.ua/vxe.
- 15
-
T. M. P. Lee.
Using Mandatory Integrity to Enforce ``Commercial'' Security.
In Proceedings of the 1988 IEEE Symposium on Security and
Privacy, pages 140-146, Oakland, California, April 1988.
- 16
-
S. B. Lipner.
Non-Discretionary Controls for Commercial Applications.
In Proceedings of the 1982 IEEE Symposium on Security and
Privacy, pages 2-10, Oakland, California, April 1982.
- 17
-
P. A. Loscocco and S. D. Smalley.
Integrating Flexible Support for Security Policies into the Linux
Operating System.
In Proceedings of the FREENIX Track: USENIX Annual Technical
Conference, June 2001.
- 18
-
E. J. McCauley and P. J. Drongowski.
KSOS - The Design of a Secure Operating System.
In Proceedings of the National Computer Conference, Vol. 48,
AFIPS Press, pages 345-353, Montvale, New Jersey, 1979.
- 19
-
M. D. McIlroy and J. A. Reeds.
Multilevel security with fewer fetters.
In Proceedings of the USENIX UNIX Security Workshop, pages
24-31, August 1988.
- 20
-
T. Mitchem, R. Lu, and R. O'Brien.
Using Kernel Hypervisors to Secure Applications.
In Proceedings of the 13th Annual Computer Security Applications
Conference, San Diego, California, December 1997.
- 21
-
A. G. Morgan.
linux-privs.
https://www.kernel.org/ pub/linux/libs/security/linux-privs/old/doc.
- 22
-
A. Ott.
Regel-basierte Zugriffskontrolle nach dem Generalized Framework for
Access Control-Ansatz am Beispiel Linux.
Master's thesis, Universitat Hamburg, Fachbereich Informatik, 1997.
- 23
-
G. J. Popek, M. Kampe, C. S. Kline, A. Stoughton, M. Urban, and E. J. Walton.
UCLA Secure UNIX.
In Proceedings of the National Computer Conference, Vol. 48,
AFIPS Press, pages 355-364, Montvale, New Jersey, 1979.
- 24
-
SAIC.
SAIC DTE.
https://research-cistw.saic.com/ cace/dte.html.
- 25
-
J. H. Saltzer and M. D. Schroder.
The Protection of Information in Computer Systems.
In Proceedings of the IEEE Vol. 63(9), pages 1278-1308,
September 1975.
- 26
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security
Policies.
In Proceedings of the 8th USENIX Security Symposium, pages
123-139, Washington, DC, August 1999.
- 27
-
R. Watson.
TrustedBSD: Adding Trusted Operating System Features to FreeBSD.
In Proceedings of the FREENIX Track: USENIX Annual Technical
Conference, June 2001.
- 28
-
H. Xie and P. Biondi.
LIDS.
https://www.lids.org.
- 29
-
M. Zelem, M. Pikula, and M. Ockajak.
Medusa DS9.
https://medusa.fornax.sk.
2001-04-30