Have You Driven an SELinux Lately?
暂无分享,去创建一个
[1] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[2] Peter Loscocco,et al. Meeting Critical Security Objectives with Security-Enhanced Linux , 2001 .
[3] Eamon F. Walsh,et al. Application of the Flask Architecture to the X Window System Server , 2007 .
[4] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[5] Using GConf as an Example of How to Create an Userspace Object Manager , 2007 .
[6] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[7] C. Pollard,et al. Center for the Study of Language and Information , 2022 .
[8] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[9] Ajaya Chitturi. Implementing Mandatory Network Security In A Policy-Flexible System , 1998 .
[10] Karl MacMillan,et al. Reference Policy for Security Enhanced Linux , 2006 .