V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies
暂无分享,去创建一个
[1] Nicholas Chen,et al. TreeJuxtaposer : Scalable Tree Comparison using Focus + Context with Guaranteed Visibility , 2006 .
[2] Ben Shneiderman,et al. Group-in-a-Box Layout for Multi-faceted Analysis of Communities , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[3] Peng Ning,et al. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning , 2015, USENIX Security Symposium.
[4] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[5] Mohamed Shehab,et al. SEGrapher: Visualization-based SELinux policy analysis , 2011, 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG).
[6] Ben Shneiderman,et al. TreeVersity: Interactive Visualizations for Comparing Hierarchical Data Sets , 2013 .
[7] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[8] M. Sheelagh T. Carpendale,et al. A Review of Temporal Data Visualizations Based on Space-Time Cube Operations , 2014, EuroVis.
[9] Hong Chen,et al. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems , 2009, NDSS.
[10] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[11] Karsten Klein,et al. High-Quality Ultra-Compact Grid Layout of Grouped Networks , 2016, IEEE Transactions on Visualization and Computer Graphics.
[12] Lujo Bauer,et al. Expandable grids for visualizing and authoring computer security policies , 2008, CHI.
[13] Peter Loscocco,et al. Meeting Critical Security Objectives with Security-Enhanced Linux , 2001 .
[14] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[15] Gail-Joon Ahn,et al. Visualization-based policy analysis for SELinux: framework and user study , 2012, International Journal of Information Security.
[16] Patrice Clemente,et al. SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs , 2012, AMT.
[17] Peter Eades,et al. FADE: Graph Drawing, Clustering, and Visual Abstraction , 2000, GD.
[18] Gail-Joon Ahn,et al. Visualization based policy analysis: case study in SELinux , 2008, SACMAT '08.
[19] David Caplan,et al. SELinux by Example: Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) , 2006 .
[20] Qian Xu,et al. Visualization Analysis of Multi-Domain Access Control Policy Integration Based on Tree-Maps and Semantic Substrates , 2012 .
[21] Kim Marriott,et al. HOLA: Human-like Orthogonal Network Layout , 2016, IEEE Transactions on Visualization and Computer Graphics.