![]() Clair L, Schiffman J, Jaeger T, McDaniel P (2007) Establishing and sustaining system integrity via root of trust installation.Once a user has been authenticated and authorized to enter a system using a user account or identity, an access control system establishes restrictions that govern who, when, where, and, in some cases, how that user can browse the system. In: Proceedings of the 2007 USENIX annual technical conference, Santa Clara, May 2007, pp 205–218 Hicks B, Rueda S, Jaeger T, McDaniel P (2007) From trusted to secure: building and executing applications that enforce systems security. In: Proceedings of the network and distributed systems security symposium, San Diego, February 2006, pp 267–280 Shankar U, Jaeger T, Sailer R (2006) Toward automated information-flow integrity verification for security-critical applications. Technical Report 01-43, NAI Labsįerraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ![]() Smalley S, Vance C, Salamon W (2001) Implementing SELinux as a Linux security module. Wright C, Cowan C, Smalley S, Morris J, Kroah-Hartman G (2002) Linux security modules. In: Proceedings of the 6th international conference on advances in mobile computing & multimedia (MoMM2008), Linz, Austria, November 2008 Artech House, Boston and Londonĭecker M (2008) Requirements for a location-based access control model. Legacy MLS/Trusted Systems and SELinux – Concepts and Comparisons to Simplify Migration and Adoption (2006) Hewlett-Packard White Paper 4AA1–0827ENWįerraiolo DF, Kuhn DR, Chandramouli R (2003) Role-based access control. HP-UX Trusted Computing Services Administrator’s Guide (2007) HP Part Number: 5991–7466 Trusted Solaris 8 Operating Environment, White Paper (2000) Sun Microsystems, Palo AltoįreeBSD handbook, FreeBSD Documentation Project (2000) Emerald, Bingleyīishop M (2005) Introduction to computer security. In: Raghav Rao H, Upadhyaya S (eds) Information assurance, security and privacy services. ![]() Li N, Mao Z, Chen H (2009) Usable mandatory access control for operating systems. In: Sarbazi-Azad H, Parhami B, Miremadi S-G, Hessabi S (eds) Advances in computer science and engineering. Jafarian JH, Amini M, Jalili R (2009) A dynamic mandatory access control model. Ray I, Kumar M (2006) Towards a location-based mandatory access control model. McCarty B (2004) SELINUX: NSA’s open source security enhanced Linux. National Academies Press, Washington, DCīauer M (2006) An introduction to Novell AppArmor. In: Proceedings of the IEEE symposium on security and privacy, Oakland, pp 286–292Ĭommittee on Computer-Computer Communication Protocols (1985) Transport protocols for department of defense data networks. Weissman C (1992) BLACKER: security for the DDN, examples of A1 security engineering trades. National Computer Security Center (1991) Final evaluation report: Boeing space and defense group, MLS LAN Secure Network Server System, 28 August 1991 ![]() 4009, 26 April 2001ĭepartment of Defense (1985) Trusted computer system evaluation criteria, DOD 5200.28-STD, December 1985īell DE, La Padula LJ (1976) Secure computer system: unified exposition and MULTICS, Technical Report ESD-TR-75–306, The MITRE Corporation, Bedfordįraim LJ (1983) SCOMP: a solution to the multilevel security problem. Prentice Hall, Upper Saddle RiverĬommittee of National Security Systems (2001) National information assurance (IA) Glossary, CNSS Instruction No. Pfleeger CP, Pfleeger SL (2007) Security in computing, 4th edn. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |