Documents Related by Co-Citation

231 Integrating Flexible Support for Security Policies into the Linux Operating System – Peter Loscocco, Stephen Smalley
138 A practical alternative to hierarchical integrity policies – W E Boebert, R Y Kain - 1985
618 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
168 EROS: a fast capability system – Jonathan S. Shapiro, Jonathan M. Smith, David J. Farber - 1999
175 Computer security technology planning study – J P ANDERSON - 1972
127 Hardening COTS Software with Generic Software Wrappers – Lee Badger, Mark Feldman, Glenwood Md - 1999
375 A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker – Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
1251 Xen and the art of virtualization – Paul Barham, Boris Dragovic, Keir Fraser, Steven H, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
55 Confining Root Programs with Domain and Type Enforcement (DTE – K M Walker, D F Sterne, M L Badger, M J Petkac, D L Sherman an K A Oostendorp - 1996
113 Preventing Privilege Escalation – Niels Provos - 2003
87 SLIC: An extensibility system for commodity operating systems – Douglas P. Ghormley, David Petrou, Thomas E. Anderson, Steven H. Rodrigues
127 Linux security modules: General security support for the linux kernel – Chris Wright, Crispin Cowan, James Morris - 2002
420 Integrity Considerations for Secure Computer Systems – K J Biba - 1977
303 Terra: a virtual machine-based platform for trusted computing – Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh - 2003
73 A Domain and Type Enforcement UNIX Prototype – Lee Badger, Lee Badger, Daniel F. Sterne, Daniel F. Sterne, David L. Sherman, David L. Sherman, Kenneth M. Walker, Kenneth M. Walker, Sheila A. Haghighat, Sheila A. Haghighat - 1996
400 Secure Computer Systems: Mathematical Foundations – D E Bell, L J LaPadula - 1973
25 A Generalized Framework for Access Control: An Informal Description – M D Abrams, L J LaPadula, K W Eggers, I M Olson - 1990
329 The chinese wall security policy – D F C Brewer, M J Nash - 1989
59 LOMAC: Low Water-Mark Integrity Protection for COTS Environments – Timothy Fraser - 2000