메뉴 건너뛰기




Volumn , Issue , 2003, Pages 59-74

Analyzing integrity protection in the SELinux example policy

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SEMANTICS;

EID: 85077749236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (111)

References (23)
  • 4
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Mitre Corp, Bedford MA, June
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
    • (1975) Technical Report MTR-3153, Mitre Corporation
    • Biba, K.J.1
  • 7
    • 85077752143 scopus 로고    scopus 로고
    • A. Herzog. Personal communication. November 2002
    • A. Herzog. Personal communication. November 2002.
  • 15
    • 33846312687 scopus 로고    scopus 로고
    • Thirty years later: Lessons from the multics security evaluation
    • Revision 2, September
    • P. Karger and R. Schell. Thirty years later: Lessons from the Multics security evaluation. IBM Technical Report, RC 22534, Revision 2, September 2002.
    • (2002) IBM Technical Report, RC 22534
    • Karger, P.1    Schell, R.2
  • 19
    • 85077736569 scopus 로고    scopus 로고
    • Core policy, second pass
    • W Salamon. Core policy, second pass. SELinux mailing list archives, http://www.nsa.gov/selinux/list-archive/3941.html, 2003.
    • (2003) SELinux Mailing List Archives
    • Salamon, W.1
  • 20
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux policy
    • June
    • S. Smalley. Configuring the SELinux policy. NAI Labs Report #02-007, available at www.nsa.gov/selinux, June 2002.
    • (2002) NAI Labs Report
    • Smalley, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.