next up previous contents
Up: Integrating Flexible Support for Previous: To Do   Contents

Bibliography

1
W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security Conference, 1985.

2
T. Fine and S. E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 206-218, May 1993.

3
Institute of Electrical and Electronics Engineers, Inc.
Information Technology -- Portable Operating System Interface (POSIX) -- Part 1: System Application Program Interface (API) [C Language], 1996.
Std 1003.1, 1996 Edition.

4
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, Oct. 1998.

5
S. E. Minear.
Providing Policy Control Over Object Operations in a Mach Based System.
In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.

6
O. S. Saydjari, J. M. Beckman, and J. R. Leaman.
LOCK Trek: Navigating Uncharted Space.
In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 167-175, 1989.

7
S. Smalley and T. Fraser.
A Security Policy Configuration for the Security-Enhanced Linux.
Technical report, NAI Labs, Oct. 2000.

8
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages 123-139, Aug. 1999.