메뉴 건너뛰기




Volumn , Issue , 2002, Pages 225-234

Runtime verification of authorization hook placement for the Linux Security Modules framework

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER SOFTWARE SELECTION AND EVALUATION; DATA STRUCTURES; INTERFACES (COMPUTER); RESPONSE TIME (COMPUTER SYSTEMS); SECURITY OF DATA;

EID: 0037673305     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/586139.586141     Document Type: Conference Paper
Times cited : (53)

References (18)
  • 2
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 4
    • 33748164174 scopus 로고    scopus 로고
    • Runtime verification of authorization hook placement for the Linux Security Modules framework
    • Technical Report RC22254, IBM Research, December
    • A. Edwards, T. Jaeger, and X. Zhang. Runtime verification of authorization hook placement for the Linux Security Modules framework. Technical Report RC22254, IBM Research, December 2001.
    • (2001)
    • Edwards, A.1    Jaeger, T.2    Zhang, X.3
  • 7
    • 3142617536 scopus 로고    scopus 로고
    • The design and verification of a cryptographic security architecture
    • August 2000; Submitted thesis
    • P. Gutmann. The design and verification of a cryptographic security architecture, August 2000. Submitted thesis. Available at www.cs.auckland.ac.nz/pgut001/pubs/thesis/html.
    • Gutmann, P.1
  • 10
    • 0004327108 scopus 로고    scopus 로고
    • Drawing graphs with dot
    • E. Koutsofios and S. North. Drawing graphs with Dot. Available at http://www.research.att.com/sw/tools/graphviz/.
    • Koutsofios, E.1    North, S.2
  • 13
    • 0038289816 scopus 로고
    • NCSC; National Computer Security Center; DoD 5200.28-STD, also known as the Orange Book
    • NCSC. Trusted Computer Security Evaluation Criteria. National Computer Security Center, 1985, DoD 5200.28-STD, also known as the Orange Book.
    • (1985) Trusted Computer Security Evaluation Criteria


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.