next up previous
Up: Integrating Flexible Support for Previous: Acknowledgments

Bibliography

1
Configurable Access Control Effort.
http://research-cistw.saic.com/cace.

2
Linux Intrusion Detection System.
http://www.lids.org.

3
Medusa DS9.
http://medusa.fornax.sk.

4
M. D. Abrams, K. W. Eggers, L. J. L. Padula, and I. M. Olson.
A Generalized Framework for Access Control: An Informal Description.
In Proceedings of the Thirteenth National Computer Security Conference, pages 135-143, Oct. 1990.

5
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat.
Practical Domain and Type Enforcement for UNIX.
In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 66-77, May 1995.

6
A. D. Balsa.
Linux Benchmarking HOWTO, Aug. 1997.
http://www.linuxdoc.org/HOWTO/Benchmarking-HOWTO.shtml.

7
D. E. Bell and L. J. La Padula.
Secure Computer Systems: Mathematical Foundations and Model.
Technical Report M74-244, The MITRE Corporation, Bedford, MA, May 1973.

8
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security Conference, 1985.

9
D. F. C. Brewer and M. J. Nash.
The Chinese Wall security policy.
In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 206-214, May 1989.

10
D. D. Clark and D. R. Wilson.
A Comparison of Commercial and Military Computer Security Policies.
In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194, Apr. 1987.

11
D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security Conference, pages 554-563, Oct. 1992.

12
T. Fine and S. E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 206-218, May 1993.

13
T. Fraser.
LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
In Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000.

14
J. Gilmore.
FreeSWAN.
http://www.freeswan.org.

15
S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase and Conference, Oct. 2000.

16
P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
Technical report, NSA and NAI Labs, Oct. 2000.

17
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, Oct. 1998.

18
L. McVoy and C. Staelin.
lmbench 2.
http://www.bitmover.com/lmbench.

19
MindCraft.
Webstone.
http://www.mindcraft.com/webstone.

20
S. E. Minear.
Providing Policy Control Over Object Operations in a Mach Based System.
In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.

21
D. C. Niemi.
Unixbench 4.1.0.
http://www.tux.org/pub/tux/niemi/unixbench.

22
A. Ott.
Rule Set Based Access Control as proposed in the Generalized Framework for Access Control approach in Linux.
Master's thesis, University of Hamburg, Nov. 1997.
pp. 157. http://www.rsbac.org/papers.htm.

23
Secure Computing Corp.
DTOS Formal Security Policy Model.
DTOS CDRL A004, 2675 Long Lake Rd, Roseville, MN 55113, Sept. 1996.
http://www.securecomputing.com/randt/HTML/dtos.shtml.

24
Secure Computing Corp.
DTOS Generalized Security Policy Specification.
DTOS CDRL A019, 2675 Long Lake Rd, Roseville, MN 55113, June 1997.

25
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages 123-139, Aug. 1999.

26
K. W. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and K. A. Oostendorp.
Confining Root Programs with Domain and Type Enforcement.
In Proceedings of the 6th Usenix Security Symposium, San Jose, California, 1996.

27
R. Watson.
Introducing Supporting Infrastructure for Trusted Operating System Support in FreeBSD.
In Proceedings of the 2000 BSD Conference and Expo, Oct. 2000.

28
R. Watson.
Robert Watson on FreeBSD and TrustedBSD, Jan. 2001.
http://slashdot.org/interviews/01/01/18/1251257.shtml.