-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Tech. rep, MTR-2547, I, Mitre Corporation
-
BELL, D., AND LAPADULA, D. Secure computer systems: Mathematical foundations. Tech. rep., MTR-2547, Volume I, Mitre Corporation, 1993.
-
(1993)
-
-
BELL, D.1
LAPADULA, D.2
-
2
-
-
0018685670
-
The transfer of information and authority in a protection system
-
ACM Press, pp
-
BISHOP, M., AND SNYDER, L. The transfer of information and authority in a protection system. In Proc. SOSP (1979), ACM Press, pp. 45-54.
-
(1979)
Proc. SOSP
, pp. 45-54
-
-
BISHOP, M.1
SNYDER, L.2
-
3
-
-
72249103625
-
A black-box tracing technique to identify causes of least-privilege incompatibilities
-
CHEN, S., DUNAGAN, J., VERBOWSKI, C., AND WANG, Y.-M. A black-box tracing technique to identify causes of least-privilege incompatibilities. In Proc. NDSS (2005).
-
(2005)
Proc. NDSS
-
-
CHEN, S.1
DUNAGAN, J.2
VERBOWSKI, C.3
WANG, Y.-M.4
-
4
-
-
34547365455
-
Windows access control demystified
-
Tech. rep, Princeton University
-
GOVINDAVAJHALA, S., AND APPEL, A. Windows access control demystified. Tech. rep., Princeton University, 2006.
-
(2006)
-
-
GOVINDAVAJHALA, S.1
APPEL, A.2
-
5
-
-
11944266314
-
Verifying information flow goals in Security-Enhanced Linux
-
GUTTMAN, J. D., HERZOG, A. L., RAMSDELL, J. D., AND SKORUPKA, C. W. Verifying information flow goals in Security-Enhanced Linux. J. Comput. Secur. 13, 1 (2005), 115-134.
-
(2005)
J. Comput. Secur
, vol.13
, Issue.1
, pp. 115-134
-
-
GUTTMAN, J.D.1
HERZOG, A.L.2
RAMSDELL, J.D.3
SKORUPKA, C.W.4
-
6
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. Protection in operating systems. Commun. ACM 19, 8 (1976), 461-471.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
HARRISON, M.A.1
RUZZO, W.L.2
ULLMAN, J.D.3
-
7
-
-
34547316824
-
Achieving security goals with Security-Enhanced Linux
-
Tech. rep, Mitre Corporation
-
HERZOG, A., AND GUTTMAN, J. Achieving security goals with Security-Enhanced Linux. Tech. rep., Mitre Corporation, 2002.
-
(2002)
-
-
HERZOG, A.1
GUTTMAN, J.2
-
9
-
-
84968352943
-
Policy management using access control spaces
-
JAEGER, T., ZHANG, X., AND CACHEDA, F. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6, 3 (2003), 327-364.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 327-364
-
-
JAEGER, T.1
ZHANG, X.2
CACHEDA, F.3
-
10
-
-
34547263169
-
-
Security analysis. Personal communication
-
LAMBERT, J. Security analysis. Personal communication.
-
-
-
LAMBERT, J.1
-
11
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
LIPTON, R. J., AND SNYDER, L. A linear time algorithm for deciding subject security. J. ACM 24, 3 (1977), 455-464.
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
LIPTON, R.J.1
SNYDER, L.2
-
12
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
LOSCOCCO, P. A., SMALLEY, S. D., MUCKELBAUER, P. A., TAYLOR, R. C., TURNER, S. J., AND FARRELL, J. F. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proc. NISSC (1998).
-
(1998)
Proc. NISSC
-
-
LOSCOCCO, P.A.1
SMALLEY, S.D.2
MUCKELBAUER, P.A.3
TAYLOR, R.C.4
TURNER, S.J.5
FARRELL, J.F.6
-
13
-
-
0022012611
-
A comment on the 'basic security theorem' of Bell and LaPadula
-
MCLEAN, J. A comment on the 'basic security theorem' of Bell and LaPadula. Inf. Process. Lett. 20, 2 (1985), 67-70.
-
(1985)
Inf. Process. Lett
, vol.20
, Issue.2
, pp. 67-70
-
-
MCLEAN, J.1
-
14
-
-
0025211594
-
The specification and modeling of computer security
-
MCLEAN, J. The specification and modeling of computer security. Computer 23, 1 (1990), 9-16.
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
MCLEAN, J.1
-
16
-
-
33845946418
-
Microsoft Windows Internals
-
Fourth Edition:, Microsoft Press
-
RUSINOVICH, M. E., AND SOLOMON, D. A. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server 2003, Windows XP, and Windows 2000. Microsoft Press, 2005.
-
(2000)
Microsoft Windows Server 2003, Windows XP, and Windows
-
-
RUSINOVICH, M.E.1
SOLOMON, D.A.2
-
17
-
-
0027699087
-
Lattice-based access control models
-
SANDHU, R. S. Lattice-based access control models. Computer 26, 11 (1993), 9-19.
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
SANDHU, R.S.1
-
19
-
-
34547277825
-
-
SYME, D. F#. http://research.microsoft.com/fsharp/fsharp.aspx.
-
SYME, D. F#. http://research.microsoft.com/fsharp/fsharp.aspx.
-
-
-
|