An OS Security Protection Model for Defeating Attacks from Network
暂无分享,去创建一个
[1] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[4] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[6] Timothy Fraser,et al. LOMAC: MAC You Can Live With , 2001, USENIX Annual Technical Conference, FREENIX Track.
[7] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[8] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[9] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[10] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[11] Phil Kearns,et al. Domain and Type Enforcement for Linux , 2000, Annual Linux Showcase & Conference.
[12] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .