References

[BoebertNCSC1985] W. Boebert and R. Kain, "A Practical Alternative to Hierarchical Integrity Policies", Proceedings of the Eighth National Computer Security Conference, 1985.

[FerraioloNCSC1992] David Ferraiolo and Richard Kuhn, "Role-Based Access Controls", Proceedings of the 15th National Computer Security Conference, October 1992.

[LoscoccoFreenix2001] Peter Loscocco and Stephen Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System", Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, The USENIX Association, June 2001.

[LoscoccoOLS2001] Peter Loscocco and Stephen Smalley, "Meeting Critical Security Objectives with Security-Enhanced Linux", Proceedings of the 2001 Ottawa Linux Symposium, July 2001.

[LoscoccoNSATR2001] Peter Loscocco and Stephen Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System", NSA Technical Report, February 2001.

[SmalleyNAITR2001] Stephen Smalley and Timothy Fraser, "A Security Policy Configuration for the Security-Enhanced Linux", NAI Labs Technical Report, February 2001.

[SmalleyModuleTR2001] Stephen Smalley, Chris Vance, and Wayne Salamon, "Implementing SELinux as a Linux Security Module", NAI Labs Report #01-043, December 2001.

[SpencerUsenixSec1999] Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau, "The Flask Security Architecture: System Support for Diverse Security Policies", Proceedings of the Eighth USENIX Security Symposium, The USENIX Association, August 1999.