-
3
-
-
0004200684
-
Computer security technology planning study
-
J. P. Anderson, "Computer security technology planning study. volume 2," DTIC Document, Tech. Rep., 1972
-
(1972)
DTIC Document, Tech. Rep.
, vol.2
-
-
Anderson, J.P.1
-
5
-
-
48649085054
-
Retrofitting the ibm power hypervisor to support mandatory access control
-
E. Valdez, R. Sailer, and R. Perez, "Retrofitting the ibm power hypervisor to support mandatory access control," in Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007, pp. 221-231
-
(2007)
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual. IEEE
, pp. 221-231
-
-
Valdez, E.1
Sailer, R.2
Perez, R.3
-
6
-
-
51949119355
-
-
Techn. Rep. RC23511
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. Van Doorn, J. L. Griffin, S. Berger, R. Sailer, E. Valdez, T. Jaeger et al., "shype: Secure hypervisor approach to trusted virtualized systems," Techn. Rep. RC23511, 2005
-
(2005)
Shype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
Sailer, R.8
Valdez, E.9
Jaeger, T.10
-
7
-
-
38049045448
-
Shamon: A system for distributed mandatory access control
-
J. M. McCune, T. Jaeger, S. Berger, R. Caceres, and R. Sailer, "Shamon: A system for distributed mandatory access control," in Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual. IEEE, 2006, pp. 23-32
-
(2006)
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual. IEEE
, pp. 23-32
-
-
McCune, J.M.1
Jaeger, T.2
Berger, S.3
Caceres, R.4
Sailer, R.5
-
8
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman, "Linux security modules: General security support for the linux kernel," in Proceedings of the 11th USENIX Security Symposium. USENIX Association, 2002, pp. 17-31
-
(2002)
Proceedings of the 11th USENIX Security Symposium. USENIX Association
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
9
-
-
84882241119
-
Design and implementation of linux file mandatory access control
-
Springer
-
L. Tian, X. Rong, and T. Liu, "Design and implementation of linux file mandatory access control," in Network Computing and Information Security. Springer, 2012, pp. 15-22
-
(2012)
Network Computing and Information Security
, pp. 15-22
-
-
Tian, L.1
Rong, X.2
Liu, T.3
-
10
-
-
34548763868
-
Usable mandatory integrity protection for operating systems
-
N. Li, Z. Mao, and H. Chen, "Usable mandatory integrity protection for operating systems," in Security and Privacy, 2007. SP'07. IEEE Symposium on. IEEE, 2007, pp. 164-178
-
(2007)
Security and Privacy, 2007. SP'07. IEEE Symposium On. IEEE
, pp. 164-178
-
-
Li, N.1
Mao, Z.2
Chen, H.3
-
11
-
-
77952387420
-
Lothlorien: Mandatory access control using linux security modules
-
K. Harsha, B. M. Palavalli, S. Rao et al., "Lothlorien: mandatory access control using linux security modules," in Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on. IEEE, 2009, pp. 1-6
-
(2009)
Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference On. IEEE
, pp. 1-6
-
-
Harsha, K.1
Palavalli, B.M.2
Rao, S.3
-
12
-
-
77952401195
-
Lsm-based secure system monitoring using kernel protection schemes
-
T. Isohara, K. Takemori, Y. Miyake, N. Qu, and A. Perrig, "Lsm-based secure system monitoring using kernel protection schemes," in Availability, Reliability, and Security, 2010. ARES'10 International Conference on. IEEE, 2010, pp. 591-596
-
(2010)
Availability, Reliability, and Security, 2010. ARES'10 International Conference On. IEEE
, pp. 591-596
-
-
Isohara, T.1
Takemori, K.2
Miyake, Y.3
Qu, N.4
Perrig, A.5
-
13
-
-
77955220788
-
A logical specification and analysis for selinux mls policy
-
B. Hicks, S. Rueda, L. St Clair, T. Jaeger, and P. McDaniel, "A logical specification and analysis for selinux mls policy," ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 3, p. 26, 2010
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.3
, pp. 26
-
-
Hicks, B.1
Rueda, S.2
St Clair, L.3
Jaeger, T.4
McDaniel, P.5
-
15
-
-
49449094810
-
Security and integrity of a distributed file storage in a virtual environment
-
G. Sala, D. Sgandurra, and F. Baiardi, "Security and integrity of a distributed file storage in a virtual environment," in Security in Storage Workshop, 2007. SISW'07. Fourth International IEEE. IEEE, 2007, pp. 58-69
-
(2007)
Security in Storage Workshop, 2007. SISW'07. Fourth International IEEE. IEEE
, pp. 58-69
-
-
Sala, G.1
Sgandurra, D.2
Baiardi, F.3
-
17
-
-
50949130846
-
Security enforcement model for distributed usage control
-
X. Zhang, J.-P. Seifert, and R. Sandhu, "Security enforcement model for distributed usage control," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. IEEE, 2008, pp. 10-18
-
(2008)
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference On. IEEE
, pp. 10-18
-
-
Zhang, X.1
Seifert, J.-P.2
Sandhu, R.3
-
18
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel, M. Rosenblum et al., "A virtual machine introspection based architecture for intrusion detection." in NDSS, vol. 3, 2003, pp. 191-206
-
(2003)
NDSS
, vol.3
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
19
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of - The-box semantic view reconstruction
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 128-138
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
20
-
-
84868140067
-
Constructing a cloud-based ids by merging vmi with fma
-
C. Harrison, D. Cook, R. McGraw, and J. Hamilton, "Constructing a cloud-based ids by merging vmi with fma," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012, pp. 163-169.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference On. IEEE
, pp. 163-169
-
-
Harrison, C.1
Cook, D.2
McGraw, R.3
Hamilton, J.4
|