Bibliography

1
Linux Intrusion Detection System.
http://www.lids.org.
2
Linux security module.
http://lsm.immunix.org.
3
Medusa DS9.
http://medusa.fornax.sk.
4
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat.
Practical Domain and Type Enforcement for UNIX.
In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 66-77, May 1995.
5
D. E. Bell and L. J. La Padula.
Secure Computer Systems: Mathematical Foundations and Model.
Technical Report M74-244, The MITRE Corporation, Bedford, MA, May 1973.
6
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security Conference, 1985.
7
D. F. C. Brewer and M. J. Nash.
The Chinese Wall security policy.
In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 206-214, May 1989.
8
D. D. Clark and D. R. Wilson.
A Comparison of Commercial and Military Computer Security Policies.
In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194, Apr. 1987.
9
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor.
SubDomain: Parsimonious Server Security.
In Proceedings of the USENIX 14th Systems Administration Conference (LISA), New Orleans, LA, Dec. 2000.
10
D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security Conference, pages 554-563, Oct. 1992.
11
S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase and Conference, Oct. 2000.
12
P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
Technical report, NSA and NAI Labs, Oct. 2000.
13
P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX '01), June 2001.
14
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, Oct. 1998.
15
A. Ott.
Rule Set Based Access Control as proposed in the Generalized Framework for Access Control approach in Linux.
Master's thesis, University of Hamburg, Nov. 1997.
pp. 157. http://www.rsbac.org/papers.htm.
16
S. Smalley and T. Fraser.
A Security Policy Configuration for the Security-Enhanced Linux.
Technical report, NAI Labs, Oct. 2000.
17
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages 123-139, Aug. 1999.
18
K. W. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and K. A. Oostendorp.
Confining Root Programs with Domain and Type Enforcement.
In Proceedings of the 6th Usenix Security Symposium, San Jose, California, 1996.