-
1
-
-
0004200684
-
Computer security technology planning study
-
Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October
-
J. P. Anderson. Computer security technology planning study, volume II. Technical Report ESD-TR-73-31, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October 1972.
-
(1972)
Technical Report
, vol.2 ESD-TR-73-31
-
-
Anderson, J.P.1
-
8
-
-
11944266314
-
Verifying information flow goals in security-enhanced Linux
-
J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka, Verifying information flow goals in security-enhanced Linux. JCS, 13(1):115-134, 2005.
-
(2005)
JCS
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
9
-
-
85081434518
-
-
Example idioms, www.cs.wisc.edu/~vg/papers/ccs2005a/idioms.html.
-
Example Idioms
-
-
-
10
-
-
3142518085
-
Consistency analysis of authorization hook placement in the Linux security modules framework
-
May
-
T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2):175-205, May 2004.
-
(2004)
ACM TISSEC
, vol.7
, Issue.2
, pp. 175-205
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
12
-
-
24744432328
-
Securing the X Window system with SELinux
-
NAI Labs, March
-
D. Kilpatrick, W. Salamon, and C. Vance, Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, March 2003.
-
(2003)
Technical Report
, vol.3
, Issue.6
-
-
Kilpatrick, D.1
Salamon, W.2
Vance, C.3
-
14
-
-
0004148166
-
The Objective Caml system (release 3.08)
-
INRIA Rocquencourt, July
-
X. Leroy, D. Doligez, J. Garrigue, D. Rémy, and J. Vouillon. The Objective Caml system (release 3.08), Technical report, INRIA Rocquencourt, July 2004.
-
(2004)
Technical Report
-
-
Leroy, X.1
Doligez, D.2
Garrigue, J.3
Rémy, D.4
Vouillon, J.5
-
15
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
June
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical, June 2001.
-
(2001)
USENIX Annual Technical
-
-
Loscocco, P.1
Smalley, S.2
-
16
-
-
0025211594
-
The specification and modeling of computer security
-
J. McLean. The specification and modeling of computer security. IEEE Computer, 23(1):9-16, 1990.
-
(1990)
IEEE Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
19
-
-
0002823436
-
Two approaches to interprocedural dataflow analysis
-
S. Muchnick and N. Jones, editors, Prentice Hall
-
M. Sharir and A. Pnueli. Two approaches to interprocedural dataflow analysis. In S. Muchnick and N. Jones, editors, Program Flow Analysis: Theory and Applications, pages 189-233, Prentice Hall, 1981.
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-233
-
-
Sharir, M.1
Pnueli, A.2
-
20
-
-
85081435056
-
-
Simplify
-
Simplify. http://research.compaq.com/SRC/esc/Simplify.html.
-
-
-
|