메뉴 건너뛰기




Volumn 25, Issue 4, 2007, Pages

Labels and event processes in the Asbestos operating system

Author keywords

Information flow; Labels; Mandatory access control; Process abstractions; Secure Web servers

Indexed keywords

INFORMATION FLOW; MANDATORY ACCESS CONTROL; PROCESS ABSTRACTIONS; SECURE WEB SERVERS;

EID: 37049002830     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/1314299.1314302     Document Type: Article
Times cited : (79)

References (49)
  • 1
    • 5444269374 scopus 로고    scopus 로고
    • The Apache HTTP Server Project
    • APACHE. The Apache HTTP Server Project, http://httpd.apache.org.
    • APACHE1
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • Tech. Rep. MTR-2997, Rev. 1, MITRE Corp, Bedford, MA
    • BELL, D. E. AND LA PADULA, L. 1976. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA.
    • (1976)
    • BELL, D.E.1    LA PADULA, L.2
  • 6
    • 0023979646 scopus 로고
    • The V distributed system
    • CHERITON, D. R. 1988. The V distributed system. J. ACM 31, 3, 314-33.
    • (1988) J. ACM , vol.31 , Issue.3 , pp. 314-333
    • CHERITON, D.R.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 5, 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • DENNING, D.E.1
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • DENNING, D. E. AND DENNING, P. J. 1977. Certification of programs for secure information flow. Commun. ACM 20, 7, 504-513.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • DENNING, D.E.1    DENNING, P.J.2
  • 9
    • 37048998640 scopus 로고
    • Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense
    • DEPARTMENT OF DEFENSE
    • DEPARTMENT OF DEFENSE. 1985. Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense. DoD 5200.28-STD.
    • (1985) DoD 5200.28-STD
  • 12
    • 0033690785 scopus 로고    scopus 로고
    • LOMAC: Low water-mark integrity protection for COTS environments
    • Oakland, CA
    • FRASER, T. 2000. LOMAC: Low water-mark integrity protection for COTS environments. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 230-245.
    • (2000) Proceedings of the IEEE Symposium on Security and Privacy , pp. 230-245
    • FRASER, T.1
  • 14
    • 0024089972 scopus 로고
    • The confused deputy (or why capabilities might have been invented)
    • HARDY, N. 1988. The confused deputy (or why capabilities might have been invented). Operat. Syst. Rev. 22, 4, 36-38.
    • (1988) Operat. Syst. Rev , vol.22 , Issue.4 , pp. 36-38
    • HARDY, N.1
  • 18
    • 0021197579 scopus 로고
    • An augmented capability architecture to support lattice security and traceability of access
    • Oakland, CA
    • KARGER, P. A. AND HERBERT, A. J. 1984. An augmented capability architecture to support lattice security and traceability of access. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 2-12.
    • (1984) Proceedings of the IEEE Symposium on Security and Privacy , pp. 2-12
    • KARGER, P.A.1    HERBERT, A.J.2
  • 20
    • 37049003626 scopus 로고    scopus 로고
    • KEY LOGIC. 1989. The KeyKOS/KeySAFE system design. Key Logic. Tech. Rep. SEC009-01. http://www.cis.upemi.edu/~KeyKOS/.
    • KEY LOGIC. 1989. The KeyKOS/KeySAFE system design. Key Logic. Tech. Rep. SEC009-01. http://www.cis.upemi.edu/~KeyKOS/.
  • 22
  • 23
    • 84885608511 scopus 로고    scopus 로고
    • KROHN, M., EFSTATHOPOULOS, P., FREY, C., KAASHOEK, F., KOHLER, E., MAZIÈRES, D., MORRIS, R., OSBORNE, M., VANDEB OGART, S., AND ZIEGLER, D. 2005. Make least privilege a right (not a privilege). In Proceedings of the 10th Hot Topics in Operating Systems Symposium (HotOS-X). Santa Fe, NM.
    • KROHN, M., EFSTATHOPOULOS, P., FREY, C., KAASHOEK, F., KOHLER, E., MAZIÈRES, D., MORRIS, R., OSBORNE, M., VANDEB OGART, S., AND ZIEGLER, D. 2005. Make least privilege a right (not a privilege). In Proceedings of the 10th Hot Topics in Operating Systems Symposium (HotOS-X). Santa Fe, NM.
  • 24
    • 0019608720 scopus 로고    scopus 로고
    • LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
    • LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
  • 30
    • 0026910016 scopus 로고
    • Multilevel security in the UNIX tradition
    • MCILROY, M. D. AND REEDS, J. A. 1992. Multilevel security in the UNIX tradition. Softw. - Pract. Exper. 22, 8, 673-694.
    • (1992) Softw. - Pract. Exper , vol.22 , Issue.8 , pp. 673-694
    • MCILROY, M.D.1    REEDS, J.A.2
  • 32
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • 4 Oct
    • MYERS, A. C. AND LISKOV, B. 2000. Protecting privacy using the decentralized label model. ACM Trans. Comput. Syst. 9, 4 Oct., 410-442.
    • (2000) ACM Trans. Comput. Syst , vol.9 , pp. 410-442
    • MYERS, A.C.1    LISKOV, B.2
  • 33
    • 37049017902 scopus 로고    scopus 로고
    • NEWS10. 2005. Hacker accesses thousands of personal data files at CSU Chico, March 17, 2005. http ://www.news10.net/display_story.aspx?storyid= 9784.
    • NEWS10. 2005. Hacker accesses thousands of personal data files at CSU Chico, March 17, 2005. http ://www.news10.net/display_story.aspx?storyid= 9784.
  • 38
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9, 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • SALTZER, J.H.1    SCHROEDER, M.D.2
  • 40
    • 0036147270 scopus 로고    scopus 로고
    • EROS: A principle-driven operating system from the ground up
    • SHAPIRO, J. S. AND HARDY, N. 2002. EROS: A principle-driven operating system from the ground up. IEEE Softw. 19, 1, 26-33.
    • (2002) IEEE Softw , vol.19 , Issue.1 , pp. 26-33
    • SHAPIRO, J.S.1    HARDY, N.2
  • 42
    • 84858511113 scopus 로고    scopus 로고
    • SQLITE, Version 3.2.1
    • SQLITE. http://www.sqlite.org. Version 3.2.1.
  • 43
    • 0025568729 scopus 로고    scopus 로고
    • TANENBAUM, A. S., VAN RENESSE, R., VAN STAVEREN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. 1990. Experiences with the Amoeba distributed operating system. Commun. ACM 33, 12, 46-63.
    • TANENBAUM, A. S., VAN RENESSE, R., VAN STAVEREN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. 1990. Experiences with the Amoeba distributed operating system. Commun. ACM 33, 12, 46-63.
  • 44
    • 84858496652 scopus 로고    scopus 로고
    • Major breach of UCLA's computer files
    • Dec. 12, 0 ,7111141.story
    • TROUNSON, R. 2006. Major breach of UCLA's computer files. Los Angeles Times, Dec. 12, 2006. http://www.latimes.com/news/local/la-me- ucla12dec12, 0 ,7111141.story.
    • (2006) Los Angeles Times
    • TROUNSON, R.1
  • 45
    • 84858493778 scopus 로고    scopus 로고
    • VMware and the National Security Agency team to build advanced secure computer systems
    • VMWARE. 2000. VMware and the National Security Agency team to build advanced secure computer systems. Tech Trend Notes 9,4, 3-11. http://www.vmware.com/pdf/TechTrendNotes.pdf.
    • (2000) Tech Trend Notes , vol.9 , Issue.4 , pp. 3-11
    • VMWARE1
  • 46
    • 21644460050 scopus 로고    scopus 로고
    • VON BEHREN, R., CONDIT, J., ZHOU, F., NECULA, G. C., AND BREWER, E. 2003. Capriccio: Scalable threads for Internet services. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, Lake George, NY, 268-281.
    • VON BEHREN, R., CONDIT, J., ZHOU, F., NECULA, G. C., AND BREWER, E. 2003. Capriccio: Scalable threads for Internet services. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, Lake George, NY, 268-281.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.