next up previous contents
Up: A Security Policy Configuration Previous: Extensions for Installing   Contents

Bibliography

1
P. Loscocco and S. Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
Technical report, NSA and NAI Labs, Oct. 2000.

2
K. W. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and K. A. Oostendorp.
Confining Root Programs with Domain and Type Enforcement.
In Proceedings of the 6th Usenix Security Symposium, San Jose, California, 1996.