-
2
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
June
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. A domain and type enforcement UNIX prototype. In Proc. USENIX Security Symposium, June 1995.
-
(1995)
Proc. USENIX Security Symposium
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
May
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In Proc. IEEE Symposium on Security and Privacy, pages 66-77, May 1995.
-
(1995)
Proc. IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report MTR-3153, MITRE, April
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, MITRE, April 1977.
-
(1977)
-
-
Biba, K.J.1
-
7
-
-
0023266943
-
A comparision of commercial and military computer security policies
-
IEEE Computer Society Press, May
-
D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
8
-
-
10044275460
-
Subdomain: Parsimonious server security
-
Dec
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. D. Gligor. Subdomain: Parsimonious server security. In Proceedings of the 14th Conference on Systems Administration (LISA 2000), pages 355-368, Dec. 2000.
-
(2000)
Proceedings of the 14th Conference on Systems Administration (LISA 2000)
, pp. 355-368
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.D.6
-
10
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
May
-
T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In 2000 IEEE Symposium on Security and Privacy, May 2000.
-
(2000)
2000 IEEE Symposium on Security and Privacy
-
-
Fraser, T.1
-
12
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
June
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In Proc. USENIX Security Symposium, pages 1-13, June 1996.
-
(1996)
Proc. USENIX Security Symposium
, pp. 1-13
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
15
-
-
0026910016
-
Multilevel security in the unix tradition
-
Aug
-
M. D. Mcllroy and J. A. Reeds. Multilevel security in the unix tradition. Software-Practice and Experience, 22(8):673-694, Aug. 1992.
-
(1992)
Software-Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
Mcllroy, M.D.1
Reeds, J.A.2
-
20
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
21
-
-
0037252218
-
Good-enough security: Toward a pragmatic business-driven discipline
-
Jan
-
R. Sandhu. Good-enough security: Toward a pragmatic business-driven discipline. IEEE Internet Computing, 7(1):66-68, Jan. 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.1
-
23
-
-
21644436375
-
Pad's: An access control list approach to anti-viral security
-
Oct
-
D. R. Wichers, D. M. Cook, R. A. Olsson, J. Crossley, P. Kerchen, K. N. Levitt, and R. Lo. Pad's: An access control list approach to anti-viral security. In Proceedings of the 13th National Computer Security Conference, pages 340-349, Oct. 1990.
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 340-349
-
-
Wichers, D.R.1
Cook, D.M.2
Olsson, R.A.3
Crossley, J.4
Kerchen, P.5
Levitt, K.N.6
Lo, R.7
-
24
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proc. USENIX Security Symposium, pages 17-31, 2002.
-
(2002)
Proc. USENIX Security Symposium
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
|