next up previous
Next: About this document ... Up: Linux Security Module Framework Previous: Availability

Bibliography

1
The Holy Bible: Genesis 11:1-8.

2
J. Anderson.
Computer Security Technology Planning Study.
Report Technical Report ESD-TR-73-51, Air Force Elect. Systems Div., October 1972.

3
L. Badger, D.F. Sterne, and et al.
Practical Domain and Type Enforcement for UNIX.
In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1995.

4
Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghighat.
A Domain and Type Enforcement UNIX Prototype.
In Proceedings of the USENIX Security Conference, 1995.

5
D. Baker.
Fortresses built upon sand.
In Proceedings of the New Security Paradigms Workshop, 1996.

6
M. Bishop and M. Digler.
Checking for Race Conditions in File Accesses.
Computing Systems, 9(2):131-152, Spring 1996.
Also available at http://olympus.cs.ucdavis.edu/ bishop/scriv/index.html.

7
Crispin Cowan, Steve Beattie, Calton Pu, Perry Wagle, and Virgil Gligor.
SubDomain: Parsimonious Server Security.
In USENIX 14th Systems Administration Conference (LISA), New Orleans, LA, December 2000.

8
Solar Designer.
Non-Executable User Stack.
http://www.openwall.com/linux/.

9
Antony Edwards and Xiaolan Zhang.
Using CQUAL for Static Analysis of Authorization Hook Placement.
In USENIX Security Symposium, San Francisco, CA, August 2002.

10
M. Abrams et al.
Information Security: An Integrated Collection of Essays.
IEEE Comp., 1995.

11
Timothy Fraser.
LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.

12
Timothy Fraser.
LOMAC: MAC You Can Live With.
In Proceedings of the FREENIX Track, USENIX Annual Technical Conference, Boston, MA, June 2001.

13
Virgil D. Gligor, Serban I Gavrila, and David Ferraiolo.
On the Formal Definition of Separation-of-Duty Policies and their Composition.
In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1998.

14
Serge Hallyn and Phil Kearns.
Domain and Type Enforcement for Linux.
In Proceedings of the 4th Annual Linux Showcase and Conference, October 2000.

15
S. Kent and R. Atkinson.
Security Architecture for the Internet Protocol.
RFC 2401, November 1998.

16
Jay Lepreau, Bryan Ford, and Mike Hibler.
The persistent relevance of the local operating system to global applications.
In Proceedings of the ACM SIGOPS European Workshop, pages 133-140, September 1996.

17
Linux Intrusion Detection System.
World-wide web page available at http://www.lids.org.

18
T. Linden.
Operating System Structures to Support Security and Reliable Software.
ACM Computing Surveys, 8(4), December 1976.

19
Peter Loscocco and Stephen Smalley.
Integrating Flexible Support for Security Policies into the Linux Operating System.
In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX '01), June 2001.

20
Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, and John F. Farrell.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments.
In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, October 1998.

21
S. J. Leffler W. N. Joy M. K. McKusick, M. J. Karels and R. S. Faber.
Berkeley Software Architecture Manual, 4.4BSD Edition.
University of California, Berkeley, Berkeley, CA, 1994.

22
Larry W. McVoy and Carl Staelin.
lmbench: Portable Tools for Performance Analysis.
In USENIX Annual Technical Conference, 1996.
http://www.bitmover.com/lmbench/.

23
Netfilter Core Team.
The Netfilter Project: Packet Mangling for Linux 2.4, 1999.
http://www.netfilter.org/ .

24
Amon Ott.
The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension.
In Proceedings of the 8th International Linux Kongress, November 2001.

25
Eric S. Raymond.
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary.
O'Reilly & Associates, 1999.
http://www.oreilly.com/catalog/cb/.

26
Jerome H. Saltzer and Michael D. Schroeder.
The Protection of Information in Computer Systems.
Proceedings of the IEEE, 63(9), November 1975.

27
Stephen Smalley, Timothy Fraser, and Chris Vance.
Linux Security Modules: General Security Hooks for Linux.
http://lsm.immunix.org/, September 2001.

28
Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau.
The Flask Security Architecture: System Support for Diverse Security Policies.
In Proceedings of the Eighth USENIX Security Symposium, pages 123-139, August 1999.

29
Winfried Trumper.
Summary about POSIX.1e.
http://wt.xpilot.org/publications/posix.1e, July 1999.

30
WireX Communications.
Linux Security Module.
http://lsm.immunix.org/, April 2001.

31
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman.
Linux Security Modules: General Security Support for the Linux Kernel.
In USENIX Security Symposium, San Francisco, CA, August 2002.

32
Marek Zelem and Milan Pikula.
ZP Security Framework.
http://medusa.fornax.sk/English/medusa-paper.ps.



James Morris
2002-07-09