메뉴 건너뛰기




Volumn , Issue , 2007, Pages 91-100

A logical specification and analysis for SELinux MLS policy

Author keywords

Multi level security; Policy analysis; Policy compliance; SELinux

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DATA FLOW ANALYSIS; LOGIC PROGRAMMING; PROBLEM SOLVING; SECURITY OF DATA;

EID: 34548045083     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1266840.1266854     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 1
    • 34548048087 scopus 로고    scopus 로고
    • XSB: Logic programming and deductive database system for Unix and Windows. Add data for field: Note
    • XSB: Logic programming and deductive database system for Unix and Windows. Add data for field: Note.
  • 2
    • 0003400251 scopus 로고    scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Technical report, MITRE, 1973
    • D.E. Bell and L.J. Lapadula. Secure computer systems: Mathematical foundations and model. Technical report, MITRE, 1973.
    • Bell, D.E.1    Lapadula, L.J.2
  • 3
    • 34548034397 scopus 로고    scopus 로고
    • Data General Corporation, Westboro, MA. Managing Security on DG/UX System, November 1996. Manual 093-701139-04.
    • Data General Corporation, Westboro, MA. Managing Security on DG/UX System, November 1996. Manual 093-701139-04.
  • 4
    • 34548048953 scopus 로고    scopus 로고
    • FreeBSD Foundation. SEBSD: Port of SELinux FLASK and type enforcement to TrustedBSD. http://www.trustedbsd.org/sebsd.html.
    • FreeBSD Foundation. SEBSD: Port of SELinux FLASK and type enforcement to TrustedBSD. http://www.trustedbsd.org/sebsd.html.
  • 5
    • 11944266314 scopus 로고    scopus 로고
    • Verifying information flow goals in security-enhanced linux
    • Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, and Clement W. Skorupka. Verifying information flow goals in security-enhanced linux. J. Comput. Secur., 13(1):115-134, 2005.
    • (2005) J. Comput. Secur , vol.13 , Issue.1 , pp. 115-134
    • Guttman, J.D.1    Herzog, A.L.2    Ramsdell, J.D.3    Skorupka, C.W.4
  • 6
    • 34548045694 scopus 로고    scopus 로고
    • Chad Hanson. SELinux and MLS: Putting the Pieces Together. Technical Report NAI-02-007, Trusted Computer Solutions, Inc., 2006.
    • Chad Hanson. SELinux and MLS: Putting the Pieces Together. Technical Report NAI-02-007, Trusted Computer Solutions, Inc., 2006.
  • 7
    • 34548017123 scopus 로고    scopus 로고
    • From trusted to secure: Building and executing applications that enforce system security
    • Santa Clara, CA, USA, June, To appear
    • Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel. From trusted to secure: Building and executing applications that enforce system security. In Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, USA, June 2007. To appear.
    • (2007) Proceedings of the USENIX Annual Technical Conference
    • Hicks, B.1    Rueda, S.2    Jaeger, T.3    McDaniel, P.4
  • 8
    • 34548014472 scopus 로고    scopus 로고
    • A logical specification and analysis for SELinux MLS policy
    • Technical Report NAS-TR-0058-2007, Networking and Security Research Center, Department of Computer Science, Pennsylvania State University
    • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel. A logical specification and analysis for SELinux MLS policy. Technical Report NAS-TR-0058-2007, Networking and Security Research Center, Department of Computer Science, Pennsylvania State University, 2007.
    • (2007)
    • Hicks, B.1    Rueda, S.2    Clair, L.S.3    Jaeger, T.4    McDaniel, P.5
  • 10
    • 84968352943 scopus 로고    scopus 로고
    • Policy management using access control spaces
    • Trent Jaeger, Antony Edwards, and Xiaolan Zhang. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur., 6(3):327-364, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.3 , pp. 327-364
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 11
    • 77957906906 scopus 로고    scopus 로고
    • Trent Jaeger, Patrick McDaniel, Luke St.Clair, Ramon Caceres, and Reiner Sailer. Shame on trust in distributed systems. In Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), Vancouver, B.C., Canada, July 2006.
    • Trent Jaeger, Patrick McDaniel, Luke St.Clair, Ramon Caceres, and Reiner Sailer. Shame on trust in distributed systems. In Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), Vancouver, B.C., Canada, July 2006.
  • 12
    • 34548031562 scopus 로고    scopus 로고
    • P. Loscocco, S. Smalley, P. Muckelbauer, R. Tayler, J. Turner, and J. Farrel. The inevitability of failure: The flawed assumptions of security modern computing environments. In In Proceedings of the 21st National Information Systems Security Conference, 1998.
    • P. Loscocco, S. Smalley, P. Muckelbauer, R. Tayler, J. Turner, and J. Farrel. The inevitability of failure: The flawed assumptions of security modern computing environments. In In Proceedings of the 21st National Information Systems Security Conference, 1998.
  • 18
    • 34548027223 scopus 로고    scopus 로고
    • Stephen Smalley. Configuring the SELinux Policy
    • Stephen Smalley. Configuring the SELinux Policy.
  • 19
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux Policy
    • Technical Report NAI-02-007, National Security Agency, NSA, February 2002
    • Stephen Smalley. Configuring the SELinux Policy. Technical Report NAI-02-007, National Security Agency - NSA, February 2002.
    • Smalley, S.1
  • 20
    • 2442534092 scopus 로고    scopus 로고
    • Implementing SELinux as a linux security module
    • Technical Report 01-043, NAI Labs
    • Stephen Smalley, Chris Vance, and Wayne Salamon. Implementing SELinux as a linux security module. Technical Report 01-043, NAI Labs, 2001.
    • (2001)
    • Smalley, S.1    Vance, C.2    Salamon, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.