메뉴 건너뛰기




Volumn , Issue , 2005, Pages 330-339

Automatic placement of authorization hooks in the linux security modules framework

Author keywords

Hook placement; LSM; SELinux; Static analysis

Indexed keywords

AUTHORIZATION; AUTHORIZATION HOOKS; KERNEL MODULE; LINUX SECURITY MODULES (LSM) FRAMEWORK;

EID: 33745766475     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102164     Document Type: Conference Paper
Times cited : (47)

References (23)
  • 1
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October
    • J. P. Anderson. Computer security technology planning study, volume II. Technical Report ESD-TR-73-31, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October 1972.
    • (1972) Technical Report , vol.2 ESD-TR-73-31
    • Anderson, J.P.1
  • 8
    • 11944266314 scopus 로고    scopus 로고
    • Verifying information flow goals in security-enhanced Linux
    • J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka, Verifying information flow goals in security-enhanced Linux. JCS, 13(1):115-134, 2005.
    • (2005) JCS , vol.13 , Issue.1 , pp. 115-134
    • Guttman, J.D.1    Herzog, A.L.2    Ramsdell, J.D.3    Skorupka, C.W.4
  • 9
    • 85081434518 scopus 로고    scopus 로고
    • Example idioms, www.cs.wisc.edu/~vg/papers/ccs2005a/idioms.html.
    • Example Idioms
  • 10
    • 3142518085 scopus 로고    scopus 로고
    • Consistency analysis of authorization hook placement in the Linux security modules framework
    • May
    • T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2):175-205, May 2004.
    • (2004) ACM TISSEC , vol.7 , Issue.2 , pp. 175-205
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 12
    • 24744432328 scopus 로고    scopus 로고
    • Securing the X Window system with SELinux
    • NAI Labs, March
    • D. Kilpatrick, W. Salamon, and C. Vance, Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, March 2003.
    • (2003) Technical Report , vol.3 , Issue.6
    • Kilpatrick, D.1    Salamon, W.2    Vance, C.3
  • 15
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • June
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical, June 2001.
    • (2001) USENIX Annual Technical
    • Loscocco, P.1    Smalley, S.2
  • 16
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • J. McLean. The specification and modeling of computer security. IEEE Computer, 23(1):9-16, 1990.
    • (1990) IEEE Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 19
    • 0002823436 scopus 로고
    • Two approaches to interprocedural dataflow analysis
    • S. Muchnick and N. Jones, editors, Prentice Hall
    • M. Sharir and A. Pnueli. Two approaches to interprocedural dataflow analysis. In S. Muchnick and N. Jones, editors, Program Flow Analysis: Theory and Applications, pages 189-233, Prentice Hall, 1981.
    • (1981) Program Flow Analysis: Theory and Applications , pp. 189-233
    • Sharir, M.1    Pnueli, A.2
  • 20
    • 85081435056 scopus 로고    scopus 로고
    • Simplify
    • Simplify. http://research.compaq.com/SRC/esc/Simplify.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.