- 1
- Linux Intrusion Detection System.
http://www.lids.org.
- 2
- Linux security module.
http://lsm.immunix.org.
- 3
- Medusa DS9.
http://medusa.fornax.sk.
- 4
- L. Badger, D. F. Sterne, D. L. Sherman,
K. M. Walker, and S. A. Haghighat.
Practical Domain and Type Enforcement for UNIX.
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 66-77, May 1995.
- 5
- D. E. Bell and L. J. La Padula.
Secure Computer Systems: Mathematical Foundations and Model.
Technical Report M74-244, The MITRE Corporation, Bedford, MA, May
1973.
- 6
- W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security
Conference, 1985.
- 7
- D. F. C. Brewer and M. J. Nash.
The Chinese Wall security policy.
In Proceedings of the 1989 IEEE Symposium on Security and
Privacy, pages 206-214, May 1989.
- 8
- D. D. Clark and D. R. Wilson.
A Comparison of Commercial and Military Computer Security
Policies.
In Proceedings of the 1987 IEEE Symposium on Security and
Privacy, pages 184-194, Apr. 1987.
- 9
- C. Cowan, S. Beattie, G. Kroah-Hartman,
C. Pu, P. Wagle, and V. Gligor.
SubDomain: Parsimonious Server Security.
In Proceedings of the USENIX 14th Systems Administration
Conference (LISA), New Orleans, LA, Dec. 2000.
- 10
- D. Ferraiolo and R. Kuhn.
Role-Based Access Controls.
In Proceedings of the 15th National Computer Security
Conference, pages 554-563, Oct. 1992.
- 11
- S. Hallyn and P. Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase and
Conference, Oct. 2000.
- 12
- P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux
Operating System.
Technical report, NSA and NAI Labs, Oct. 2000.
- 13
- P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux
Operating System.
In Proceedings of the FREENIX Track: 2001 USENIX Annual
Technical Conference (FREENIX '01), June 2001.
- 14
- P. A. Loscocco, S. D. Smalley, P. A.
Muckelbauer, R. C. Taylor, S. J. Turner, and J. F.
Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in
Modern Computing Environments.
In Proceedings of the 21st National Information Systems
Security Conference, pages 303-314, Oct. 1998.
- 15
- A. Ott.
Rule Set Based Access Control as proposed in the Generalized
Framework for Access Control approach in Linux.
Master's thesis, University of Hamburg, Nov. 1997.
pp. 157. http://www.rsbac.org/papers.htm.
- 16
- S. Smalley and T. Fraser.
A Security Policy Configuration for the Security-Enhanced
Linux.
Technical report, NAI Labs, Oct. 2000.
- 17
- R. Spencer, S. Smalley, P. Loscocco,
M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse
Security Policies.
In Proceedings of the Eighth USENIX Security Symposium,
pages 123-139, Aug. 1999.
- 18
- K. W. Walker, D. F. Sterne, M. L. Badger,
M. J. Petkac, D. L. Sherman, and K. A.
Oostendorp.
Confining Root Programs with Domain and Type Enforcement.
In Proceedings of the 6th Usenix Security Symposium, San
Jose, California, 1996.