next up previous contents
Up: Integrating Flexible Support for Previous: To Do   Contents


W. E. Boebert and R. Y. Kain.
A Practical Alternative to Hierarchical Integrity Policies.
In Proceedings of the Eighth National Computer Security Conference, 1985.

T. Fine and S. E. Minear.
Assuring Distributed Trusted Mach.
In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 206-218, May 1993.

Institute of Electrical and Electronics Engineers, Inc.
Information Technology -- Portable Operating System Interface (POSIX) -- Part 1: System Application Program Interface (API) [C Language], 1996.
Std 1003.1, 1996 Edition.

P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, Oct. 1998.

S. E. Minear.
Providing Policy Control Over Object Operations in a Mach Based System.
In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.

O. S. Saydjari, J. M. Beckman, and J. R. Leaman.
LOCK Trek: Navigating Uncharted Space.
In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 167-175, 1989.

S. Smalley and T. Fraser.
A Security Policy Configuration for the Security-Enhanced Linux.
Technical report, NAI Labs, Oct. 2000.

R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages 123-139, Aug. 1999.