Towards a formal model for security policies specification and validation in the selinux system
暂无分享,去创建一个
[1] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[2] Trent Jaeger,et al. Policy management using access control spaces , 2003, TSEC.
[3] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[4] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[5] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[6] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[7] Trent Jaeger,et al. Analyzing Integrity Protection in the SELinux Example Policy , 2003, USENIX Security Symposium.
[8] Peter Loscocco,et al. Meeting Critical Security Objectives with Security-Enhanced Linux , 2001 .
[9] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[10] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.