메뉴 건너뛰기




Volumn , Issue , 2006, Pages 55-66

NETRA: Seeing through access control

Author keywords

Privilege escalation; Static analysis; Vulnerability reports

Indexed keywords

DATA FLOW ANALYSIS; INFORMATION THEORY; LOGIC PROGRAMMING; MATHEMATICAL MODELS; SEMANTICS; STATIC ANALYSIS;

EID: 34547327908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180337.1180343     Document Type: Article
Times cited : (25)

References (20)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Tech. rep, MTR-2547, I, Mitre Corporation
    • BELL, D., AND LAPADULA, D. Secure computer systems: Mathematical foundations. Tech. rep., MTR-2547, Volume I, Mitre Corporation, 1993.
    • (1993)
    • BELL, D.1    LAPADULA, D.2
  • 2
    • 0018685670 scopus 로고
    • The transfer of information and authority in a protection system
    • ACM Press, pp
    • BISHOP, M., AND SNYDER, L. The transfer of information and authority in a protection system. In Proc. SOSP (1979), ACM Press, pp. 45-54.
    • (1979) Proc. SOSP , pp. 45-54
    • BISHOP, M.1    SNYDER, L.2
  • 3
    • 72249103625 scopus 로고    scopus 로고
    • A black-box tracing technique to identify causes of least-privilege incompatibilities
    • CHEN, S., DUNAGAN, J., VERBOWSKI, C., AND WANG, Y.-M. A black-box tracing technique to identify causes of least-privilege incompatibilities. In Proc. NDSS (2005).
    • (2005) Proc. NDSS
    • CHEN, S.1    DUNAGAN, J.2    VERBOWSKI, C.3    WANG, Y.-M.4
  • 4
    • 34547365455 scopus 로고    scopus 로고
    • Windows access control demystified
    • Tech. rep, Princeton University
    • GOVINDAVAJHALA, S., AND APPEL, A. Windows access control demystified. Tech. rep., Princeton University, 2006.
    • (2006)
    • GOVINDAVAJHALA, S.1    APPEL, A.2
  • 5
    • 11944266314 scopus 로고    scopus 로고
    • Verifying information flow goals in Security-Enhanced Linux
    • GUTTMAN, J. D., HERZOG, A. L., RAMSDELL, J. D., AND SKORUPKA, C. W. Verifying information flow goals in Security-Enhanced Linux. J. Comput. Secur. 13, 1 (2005), 115-134.
    • (2005) J. Comput. Secur , vol.13 , Issue.1 , pp. 115-134
    • GUTTMAN, J.D.1    HERZOG, A.L.2    RAMSDELL, J.D.3    SKORUPKA, C.W.4
  • 6
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. Protection in operating systems. Commun. ACM 19, 8 (1976), 461-471.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • HARRISON, M.A.1    RUZZO, W.L.2    ULLMAN, J.D.3
  • 7
    • 34547316824 scopus 로고    scopus 로고
    • Achieving security goals with Security-Enhanced Linux
    • Tech. rep, Mitre Corporation
    • HERZOG, A., AND GUTTMAN, J. Achieving security goals with Security-Enhanced Linux. Tech. rep., Mitre Corporation, 2002.
    • (2002)
    • HERZOG, A.1    GUTTMAN, J.2
  • 9
    • 84968352943 scopus 로고    scopus 로고
    • Policy management using access control spaces
    • JAEGER, T., ZHANG, X., AND CACHEDA, F. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6, 3 (2003), 327-364.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.3 , pp. 327-364
    • JAEGER, T.1    ZHANG, X.2    CACHEDA, F.3
  • 10
    • 34547263169 scopus 로고    scopus 로고
    • Security analysis. Personal communication
    • LAMBERT, J. Security analysis. Personal communication.
    • LAMBERT, J.1
  • 11
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • LIPTON, R. J., AND SNYDER, L. A linear time algorithm for deciding subject security. J. ACM 24, 3 (1977), 455-464.
    • (1977) J. ACM , vol.24 , Issue.3 , pp. 455-464
    • LIPTON, R.J.1    SNYDER, L.2
  • 13
    • 0022012611 scopus 로고
    • A comment on the 'basic security theorem' of Bell and LaPadula
    • MCLEAN, J. A comment on the 'basic security theorem' of Bell and LaPadula. Inf. Process. Lett. 20, 2 (1985), 67-70.
    • (1985) Inf. Process. Lett , vol.20 , Issue.2 , pp. 67-70
    • MCLEAN, J.1
  • 14
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • MCLEAN, J. The specification and modeling of computer security. Computer 23, 1 (1990), 9-16.
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • MCLEAN, J.1
  • 17
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • SANDHU, R. S. Lattice-based access control models. Computer 26, 11 (1993), 9-19.
    • (1993) Computer , vol.26 , Issue.11 , pp. 9-19
    • SANDHU, R.S.1
  • 19
    • 34547277825 scopus 로고    scopus 로고
    • SYME, D. F#. http://research.microsoft.com/fsharp/fsharp.aspx.
    • SYME, D. F#. http://research.microsoft.com/fsharp/fsharp.aspx.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.