-
2
-
-
60649114437
-
-
J. P. Anderson. Computer security technology planning study. ESDTR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as I, DITCAD-758206. II DITCAD-772806).
-
J. P. Anderson. Computer security technology planning study. ESDTR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206. Vol. II DITCAD-772806).
-
-
-
-
3
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
L. Badger, D. Sterne, D. Sherman, K. Walker, and S. Haghighat. A domain and type enforcement UNIX prototype. In Proceedings of USENIX Security Symposium, 1995.
-
(1995)
Proceedings of USENIX Security Symposium
-
-
Badger, L.1
Sterne, D.2
Sherman, D.3
Walker, K.4
Haghighat, S.5
-
4
-
-
0003400251
-
Secure Computer Systems: Mathematical Foundations
-
Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
-
D. E. Bell and L. J. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
6
-
-
10044275460
-
SubDomain: Parsimonious server security
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious server security. In USENIX conference on System administration, 2000.
-
(2000)
USENIX conference on System administration
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
8
-
-
79959563970
-
Protecting users from themselves
-
W. Enck, S. Rueda, Y. Sreenivasan, J. Schiffman, L. S. Clair, T. Jaeger, and P. McDaniel. Protecting users from "themselves". In Proceedings of ACM CSAW, 2007.
-
(2007)
Proceedings of ACM CSAW
-
-
Enck, W.1
Rueda, S.2
Sreenivasan, Y.3
Schiffman, J.4
Clair, L.S.5
Jaeger, T.6
McDaniel, P.7
-
12
-
-
0031368810
-
Support for discretionary role based access control in ACL-oriented operating systems
-
C. Friberg and A. Held. Support for discretionary role based access control in ACL-oriented operating systems. In ACM workshop on Role-based access control, 1997.
-
(1997)
ACM workshop on Role-based access control
-
-
Friberg, C.1
Held, A.2
-
16
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of ACSAC, 1994.
-
(1994)
Proceedings of ACSAC
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
17
-
-
1642325574
-
Strengthening discresionary access controls to inhibit trojan horses and computer viruses
-
N. Lai and T. Gray. Strengthening discresionary access controls to inhibit trojan horses and computer viruses. In Proceedings of USENIX Summer Symposium, 1988.
-
(1988)
Proceedings of USENIX Summer Symposium
-
-
Lai, N.1
Gray, T.2
-
19
-
-
33845953872
-
-
National Security Agency, SELinux
-
National Security Agency. Security-enhanced Linux (SELinux). http://www.nsa.gov/selinux.
-
Security-enhanced Linux
-
-
-
23
-
-
0029714667
-
Unified login with pluggable authentication modules (PAM)
-
V. Samar. Unified login with pluggable authentication modules (PAM). In Proceedings of ACM CCS, 1996.
-
(1996)
Proceedings of ACM CCS
-
-
Samar, V.1
-
26
-
-
60649086326
-
Sub-identities: Towards operating system support for distributed system security
-
Technical Report 2005-18, University of Notre Dame, Department of Computer Science and Engineering, Oct
-
P. Snowberger and D. Thain. Sub-identities: Towards operating system support for distributed system security. Technical Report 2005-18, University of Notre Dame, Department of Computer Science and Engineering, Oct. 2005.
-
(2005)
-
-
Snowberger, P.1
Thain, D.2
-
27
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
Aug
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The flask security architecture: System support for diverse security policies. In Proceedings of USENIX Security Symposium, Aug. 1999.
-
(1999)
Proceedings of USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
28
-
-
33646185580
-
Polaris: Virus safe computing for windows xp
-
Technical Report HPL-2004-221, HP Laboratories Palo Alto, Dec
-
M. Stiegler, A. Karp, K.-P. Yee, and M. Miller. Polaris: Virus safe computing for windows xp. Technical Report HPL-2004-221, HP Laboratories Palo Alto, Dec. 2004.
-
(2004)
-
-
Stiegler, M.1
Karp, A.2
Yee, K.-P.3
Miller, M.4
-
29
-
-
21644486314
-
-
Trusted Computing Group, Revision 1.2, Apr. 2004
-
Trusted Computing Group. TCG specification architecture overview: Revision 1.2. http://www.trustedcomputinggroup.org, Apr. 2004.
-
TCG specification architecture overview
-
-
-
30
-
-
21644436375
-
PACL's: An access control list approach to anti-viral security
-
D. Wichers, D. Cook, R. Olsson, J. Crossley, P. Kerchen, K. Levitt, and R. Lo. PACL's: An access control list approach to anti-viral security. In Proceedings of the 13th National Computer Security Conference, 1990.
-
(1990)
Proceedings of the 13th National Computer Security Conference
-
-
Wichers, D.1
Cook, D.2
Olsson, R.3
Crossley, J.4
Kerchen, P.5
Levitt, K.6
Lo, R.7
-
31
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security Symposium, 2002.
-
(2002)
USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
|