-
1
-
-
0004200684
-
-
Tech. Rep. ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA
-
ANDERSON, J. P. Computer security technology planning study. Tech. Rep. ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA, 1972.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
3
-
-
0035790640
-
A logical framework for reasoning about access control models
-
BERTINO, E., CATANIA, B., FERRARI, E., AND PERLASCA, P. A logical framework for reasoning about access control models. In Proceedings of SACMAT (2001).
-
(2001)
Proceedings of SACMAT
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
6
-
-
0030705406
-
Analyzing consistency of security policies
-
Oakland, CA, USA, May
-
CHOLVY, L., AND CUPPENS, F. Analyzing Consistency of Security Policies. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (Oakland, CA, USA, May 1997), pp. 103–112.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 103-112
-
-
Cholvy, L.1
Cuppens, F.2
-
8
-
-
63449083259
-
A flexible security architecture to support third-party applications on mobile devices
-
DESMET, L., JOOSEN, W., MASSACCI, F., NALIUKA, K., PHILIPPAERTS, P., PIESSENS, F., AND VANOVERBERGHE, D. A flexible security architecture to support third-party applications on mobile devices. In Proceedings of the ACM Computer Security Architecture Workshop (2007).
-
(2007)
Proceedings of the ACM Computer Security Architecture Workshop
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Naliuka, K.4
Philippaerts, P.5
Piessens, F.6
Vanoverberghe, D.7
-
9
-
-
85077713333
-
Methodologies and tools for contract matching
-
DRAGONI, N., MASSACCI, F., NALIUKA, K., SEBASTIANI, R., SIAHAAN, I., QUILLIAN, T., MATTEUCCI, I., AND SHAEFER, C. Methodologies and tools for contract matching. Security of Software and Services for Mobile Systems.
-
Security of Software and Services for Mobile Systems
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Sebastiani, R.4
Siahaan, I.5
Quillian, T.6
Matteucci, I.7
Shaefer, C.8
-
10
-
-
11944266314
-
Verifying information flow goals in Security-Enhanced linux
-
GUTTMAN, J. D., HERZOG, A. L., RAMSDELL, J. D., AND SKORUPKA, C. W. Verifying information flow goals in Security-Enhanced Linux. J. Comput. Secur. 13, 1 (2005), 115–134.
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
12
-
-
33745957768
-
Trusted declassification: High-level policy for a security-typed language
-
Ottawa, Canada, June 10 ACM Press
-
HICKS, B., KING, D., MCDANIEL, P., AND HICKS, M. Trusted declassification: High-level policy for a security-typed language. In Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS’06) (Ottawa, Canada, June 10 2006), ACM Press.
-
(2006)
Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS’06)
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
Hicks, M.4
-
13
-
-
34548017123
-
From trusted to secure: Building and executing applications that enforce system security
-
HICKS, B., RUEDA, S., JAEGER, T., AND MCDANIEL, P. From trusted to secure: Building and executing applications that enforce system security. In Proceedings of the USENIX Annual Technical Conference (2007).
-
(2007)
Proceedings of the USENIX Annual Technical Conference
-
-
Hicks, B.1
Rueda, S.2
Jaeger, T.3
McDaniel, P.4
-
14
-
-
77958043445
-
Integrating SELinux with security-typed languages
-
Baltimore, MD, USA, March
-
HICKS, B., RUEDA, S., JAEGER, T., AND MCDANIEL, P. Integrating SELinux with security-typed languages. In Proceedings of the 3rd SELinux Symposium (Baltimore, MD, USA, March 2007).
-
(2007)
Proceedings of the 3rd SELinux Symposium
-
-
Hicks, B.1
Rueda, S.2
Jaeger, T.3
McDaniel, P.4
-
15
-
-
34548045083
-
A logical specification and analysis for SELinux MLS policy
-
Antipolis, France, June
-
HICKS, B., RUEDA, S., ST. CLAIR, L., JAEGER, T., AND MCDANIEL, P. A logical specification and analysis for SELinux MLS policy. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT) (Antipolis, France, June 2007).
-
(2007)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Hicks, B.1
Rueda, S.2
St. Clair, L.3
Jaeger, T.4
McDaniel, P.5
-
16
-
-
0242540396
-
Managing access control policies using access control spaces
-
ACM Press
-
JAEGER, T., EDWARDS, A., AND ZHANG, X. Managing access control policies using access control spaces. In SACMAT’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (2002), ACM Press, pp. 3–12.
-
(2002)
SACMAT’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 3-12
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
17
-
-
3142518085
-
Consistency analysis of authorization hook placement in the linux security modules framework
-
May
-
JAEGER, T., EDWARDS, A., AND ZHANG, X. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Transactions on Information and System Security (TISSEC) 7, 2 (May 2004), 175–205.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.2
, pp. 175-205
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
23
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
MYERS, A. C. JFlow: Practical mostly-static information flow control. In POPL’99, pp. 228–241.
-
POPL’99
, pp. 228-241
-
-
Myers, A.C.1
-
25
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
MYERS, A. C., AND LISKOV, B. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology 9, 4 (2000), 410–442.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
26
-
-
0005260169
-
-
Located at July
-
MYERS, A. C., NYSTROM, N., ZHENG, L., AND ZDANCEWIC, S. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
(2001)
Jif: Java + Information Flow. Software Release
-
-
Myers, A.C.1
Nystrom, N.2
Zheng, L.3
Zdancewic, S.4
-
30
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
San Diego, CA, USA, Feb
-
SHANKAR, U., JAEGER, T., AND SAILER, R. Toward automated information-flow integrity verification for security-critical applications. In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS’06) (San Diego, CA, USA, Feb. 2006).
-
(2006)
Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS’06)
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
34
-
-
85077721829
-
-
TRESYS TECHNOLOGY. SELinux Policy Server. Available at http://www.tresys.com/selinux/selinux policy server.
-
SELinux Policy Server
-
-
-
36
-
-
85077711679
-
-
December
-
WALSH, D. SELinux Mailing List. http://www.engardelinux.org/modules/index/list_ archives.cgi?list=selinu%x&page=0609. html&month=2007-12, December 2007.
-
(2007)
SELinux Mailing List
-
-
Walsh, D.1
-
37
-
-
85077685002
-
-
The X Foundation: http://www.x.org
-
The X Foundation: http://www.x.org.
-
-
-
|