Model-Driven Configuration of SELinux Policies
暂无分享,去创建一个
[1] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] Jochen Ludewig,et al. Models in software engineering – an introduction , 2003, Software and Systems Modeling.
[4] Marek Jawurek. RSBAC - a framework for enhanced Linux system security , 2006 .
[5] E. F. Michiels,et al. ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .
[6] Ruth Breu,et al. Model Driven Security for Inter-organizational Workflows in e-Government , 2005, TCGOV.
[7] Bran Selic,et al. A Systematic Approach to Domain-Specific Language Design Using UML , 2007, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07).
[8] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[9] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[10] Michael Hafner,et al. Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet , 2008, MoDELS.
[11] Trent Jaeger,et al. Analyzing Integrity Protection in the SELinux Example Policy , 2003, USENIX Security Symposium.
[12] Peter Loscocco,et al. Meeting Critical Security Objectives with Security-Enhanced Linux , 2001 .
[13] Bart De Win,et al. Engineering application-level security through aspect-oriented software development , 2004 .
[14] Jean-Marc Jézéquel,et al. ≪UML≫ 2002 — The Unified Modeling Language , 2002, Lecture Notes in Computer Science.
[15] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[16] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[17] Joshua D. Guttman,et al. Verifying information flow goals in Security-Enhanced Linux , 2005, J. Comput. Secur..
[18] J.D. Day,et al. The OSI reference model , 1983 .
[19] Ruth Breu,et al. Sectet: an extensible framework for the realization of secure inter-organizational workflows , 2006, Internet Res..
[20] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[21] David Caplan,et al. SELinux by Example: Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) , 2006 .