메뉴 건너뛰기




Volumn 7, Issue 2, 2004, Pages 175-205

Consistency analysis of authorization hook placement in the Linux security modules framework

Author keywords

Access control models; Authorization mechanisms; Role based access control

Indexed keywords

LINUX SECURITY MODULES; SOFTWARE CONFIGURATION MANAGEMENT; UNAUTHORIZED ACCESS;

EID: 3142518085     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/996943.996944     Document Type: Article
Times cited : (47)

References (26)
  • 3
    • 35048871556 scopus 로고    scopus 로고
    • SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft
    • Lecture Notes in Computer Science. Also appears at MSR-TE-2004-8
    • BALL, T., COOK, B., LEVIN, V., AND RAJAMANI, S. K. 2003. SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft. In Integrated Formal Methods, Lecture Notes in Computer Science, vol. 2999.1-20. Also appears at MSR-TE-2004-8.
    • (2003) Integrated Formal Methods , vol.2999 , pp. 1-20
    • Ball, T.1    Cook, B.2    Levin, V.3    Rajamani, S.K.4
  • 5
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Computing Systems, 9, 2, 131-152.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 21
    • 0038289816 scopus 로고
    • National Computer Security Center. DoD 5200.28-STD, also known as the Orange Book
    • NCSC. 1985. Trusted Computer Security Evaluation Criteria. National Computer Security Center. DoD 5200.28-STD, also known as the Orange Book.
    • (1985) Trusted Computer Security Evaluation Criteria


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.