-
2
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
Also available from TIS online archives
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. A Domain and Type Enforcement UNIX Prototype. In Proceedings of the 1995 USENIX Security Symposium, 1995. Also available from TIS online archives.
-
Proceedings of the 1995 USENIX Security Symposium, 1995
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
0003400257
-
Secure computer systems: Mathematical foundations (volume 1)
-
Technical Report ESD-TR-73-278, Mitre Corporation
-
D. Bell and L. La Padula. Secure Computer Systems: Mathematical Foundations (Volume 1). Technical Report ESD-TR-73-278, Mitre Corporation, 1973.
-
(1973)
-
-
Bell, D.1
La Padula, L.2
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
-
(1975)
-
-
Biba, K.J.1
-
6
-
-
0242445304
-
Bluebox: A policy-driven, host-based intrusion detection system
-
S. Chari and P.-C. Cheng. BlueBox: A policy-driven, host-based intrusion detection system. In Proceedings of the 2002 Network and Distributed Systems Security Symposium, San Diego, CA, 2002.
-
Proceedings of the 2002 Network and Distributed Systems Security Symposium, San Diego, CA, 2002
-
-
Chari, S.1
Cheng, P.-C.2
-
7
-
-
0242613564
-
Re: Security policy analysis
-
SELinux mailing list 10/10/2001
-
J. Crowley. Re: Security Policy Analysis. SELinux mailing list 10/10/2001, 2001.
-
(2001)
-
-
Crowley, J.1
-
12
-
-
0033646048
-
A model of accountability, confidentiality, and override for healthcare and other applications
-
J. J. Longstaff, M. A. Lockyer, G. Capper, and M. G. Thick. A model of accountability, confidentiality, and override for healthcare and other applications. In Proceedings of 5th ACM Workshop on Role-Based Access Control, July 2000.
-
Proceedings of 5th ACM Workshop on Role-Based Access Control, July 2000
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Capper, G.3
Thick, M.G.4
-
13
-
-
0242613566
-
-
MITRE Corporation. Apache policy for SELinux. SELinux distribution file policy/domains/system/apache.te
-
MITRE Corporation. Apache policy for SELinux. SELinux distribution file policy/domains/system/apache.te, 2002.
-
(2002)
-
-
-
14
-
-
0242445306
-
-
National Security Agency. Security-Enhanced Linux (SELinux)
-
National Security Agency. Security-Enhanced Linux (SELinux). http://www.nsa.gov/selinux, 2001.
-
(2001)
-
-
-
15
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
0242528872
-
-
Tresys Technology. Security-Enhanced Linux research
-
Tresys Technology. Security-Enhanced Linux research. www.tresys.com/selinux.html, 2001.
-
(2001)
-
-
|