Analyzing integrity protection in the SELinux example policy

作者: Reiner Sailer , Trent Jaeger , Xiaolan Zhang

DOI:

关键词:

摘要: … Our aim is to provide an access control model to express site security goals and resolve them against the SELinux policy. Ultimately, we aim to define a minimal trusted computing base (…

参考文章(16)
Spencer E. Minear, Providing policy control over object operations in a mach based system usenix security symposium. pp. 13- 13 ,(1995)
Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Lee Badger, Sheila A. Haghighat, A domain and type enforcement UNIX prototype usenix security symposium. pp. 12- 12 ,(1995)
Trent Jaeger, Antony Edwards, Xiaolan Zhang, Managing access control policies using access control spaces symposium on access control models and technologies. pp. 3- 12 ,(2002) , 10.1145/507711.507713
Trent Jaeger, Jonathon E. Tidswell, Practical safety in flexible access control models ACM Transactions on Information and System Security. ,vol. 4, pp. 158- 190 ,(2001) , 10.1145/501963.501966
Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca, A logical framework for reasoning about access control models ACM Transactions on Information and System Security. ,vol. 6, pp. 71- 127 ,(2003) , 10.1145/605434.605437
Trent Jaeger, Xiaolan Zhang, Antony Edwards, Policy management using access control spaces ACM Transactions on Information and System Security. ,vol. 6, pp. 327- 364 ,(2003) , 10.1145/937527.937528
Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman, Protection in operating systems Communications of The ACM. ,vol. 19, pp. 461- 471 ,(1976) , 10.1145/360303.360333
P.A. Karger, R.R. Schell, Thirty years later: lessons from the Multics security evaluation 18th Annual Computer Security Applications Conference, 2002. Proceedings.. pp. 119- 126 ,(2002) , 10.1109/CSAC.2002.1176285
S. Jajodia, P. Samarati, V.S. Subrahmanian, A logical language for expressing authorizations ieee symposium on security and privacy. pp. 31- 42 ,(1997) , 10.1109/SECPRI.1997.601312