메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 299-303

Extended BLP security model based on process reliability for secure linux kernel

Author keywords

[No Author keywords available]

Indexed keywords

LINUX; NETWORK SECURITY; RELIABILITY;

EID: 34648871901     PISSN: 15410110     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2001.992712     Document Type: Conference Paper
Times cited : (6)

References (24)
  • 7
    • 0019608720 scopus 로고
    • Formal models for computer security
    • Carl E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3. 1981.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3
    • Landwehr, C.E.1
  • 8
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • Jan.
    • John McLean, "The Specification and Modeling of Computer Security", Computer, Vol. 23 Issue: 1, Jan. 1990
    • (1990) Computer , vol.23 , Issue.1
    • McLean, J.1
  • 9
    • 0003400257 scopus 로고    scopus 로고
    • Secure computer systems: Mathematical foundations
    • Len Lapadula, "Secure Computer Systems: Mathematical Foundations", MITRE Technical Report, Vol I, 1996.
    • (1996) MITRE Technical Report , vol.1
    • Lapadula, L.1
  • 10
    • 0003400257 scopus 로고    scopus 로고
    • Secure computer systems: Mathematical foundations
    • Len Lapadula, "Secure Computer Systems: Mathematical Foundations", MITRE Technical Report, Vol II, 1996.
    • (1996) MITRE Technical Report , vol.2
    • Lapadula, L.1
  • 12
    • 84949239964 scopus 로고
    • Analysis and applications of petri nets
    • Tadao Murata, "Analysis and Applications of Petri Nets", Proceedings of the IEEE, Vol. 77, No. 4, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.4
    • Murata, T.1
  • 13
    • 84949239965 scopus 로고    scopus 로고
    • http://www.rsbac.de
  • 20
    • 84992925210 scopus 로고
    • Where we stand in Multilevel Security (MLS): Requirements, approaches, issues, and lessons learned
    • Bill Neugent, "Where We Stand in Multilevel Security (MLS): Requirements, Approaches, Issues, and Lessons Learned", Computer Security Applications Conference, 1994.
    • (1994) Computer Security Applications Conference
    • Neugent, B.1
  • 22
    • 0031173082 scopus 로고    scopus 로고
    • Mathematics, technology, and trust: Formal verification, computer security, and U. S. Military
    • Donald Mackenzie et al.", Mathematics, Technology, and Trust: Formal Verification, Computer Security, and U. S. Military", IEEE Annals of the History of Computing, Vol. 19 Issue: 3, 1997.
    • (1997) IEEE Annals of the History of Computing , vol.19 , Issue.3
    • Mackenzie, D.1
  • 24
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control, and audit
    • Ravi Sandhu et al., "Authentication, Access Control, and Audit", ACM Computer Survey. 28, 1996.
    • (1996) ACM Computer Survey , vol.28
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.