메뉴 건너뛰기




Volumn , Issue , 2007, Pages 164-178

Usable mandatory integrity protection for operating systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER PROGRAMMING LANGUAGES; INFORMATION RETRIEVAL; MATHEMATICAL MODELS;

EID: 34548763868     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.37     Document Type: Conference Paper
Times cited : (53)

References (24)
  • 4
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report MTR-3153, MITRE, April
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, MITRE, April 1977.
    • (1977)
    • Biba, K.J.1
  • 5
    • 85084162921 scopus 로고    scopus 로고
    • PrivTrans: Automatically partitioning programs for privilege separation
    • August
    • D. Brumley and D. Song. PrivTrans: Automatically partitioning programs for privilege separation. In Proceedings of the USENIX Security Symposium, August 2004.
    • (2004) Proceedings of the USENIX Security Symposium
    • Brumley, D.1    Song, D.2
  • 7
    • 0023266943 scopus 로고
    • A comparision of commercial and military computer security policies
    • IEEE Computer Society Press, May
    • D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 10
    • 0033690785 scopus 로고    scopus 로고
    • LOMAC: Low water-mark integrity protection for COTS environments
    • May
    • T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In 2000 IEEE Symposium on Security and Privacy, May 2000.
    • (2000) 2000 IEEE Symposium on Security and Privacy
    • Fraser, T.1
  • 12
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications: Confining the wily hacker
    • June
    • I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In Proc. USENIX Security Symposium, pages 1-13, June 1996.
    • (1996) Proc. USENIX Security Symposium , pp. 1-13
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.A.4
  • 15
    • 0026910016 scopus 로고
    • Multilevel security in the unix tradition
    • Aug
    • M. D. Mcllroy and J. A. Reeds. Multilevel security in the unix tradition. Software-Practice and Experience, 22(8):673-694, Aug. 1992.
    • (1992) Software-Practice and Experience , vol.22 , Issue.8 , pp. 673-694
    • Mcllroy, M.D.1    Reeds, J.A.2
  • 20
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 21
    • 0037252218 scopus 로고    scopus 로고
    • Good-enough security: Toward a pragmatic business-driven discipline
    • Jan
    • R. Sandhu. Good-enough security: Toward a pragmatic business-driven discipline. IEEE Internet Computing, 7(1):66-68, Jan. 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 66-68
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.