정보전에 대비한 정보통신기반 구축용 보안 운영체제 기술

  • Published : 2000.12.01

Abstract

Keywords

References

  1. The Inevitablility of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco;Wtephen D. Dmalley;Patric A. Muckelbauer;Ruth C. Taylor;S.Jeff Truner;John F. Farrel
  2. Proceeding of the 8th USENIX Security Symposium The Flask Security Architecture : System Support for diverse Security Policies Ray Spencer;Stephen Smalley;Peter Loscocco;Mike Hibler;Dave Anderson;Jay Lepreau
  3. UNICOS Multilevel Security(MLS) Features Users Guide, SG-21111 10.0
  4. National Coordination Office for Information Technology Research and Development Web.
  5. DOD 5200.28-STD Department of Defense Trusted Computer System Evaludation Criteria DOD
  6. Proceeding of the 15th National Computer Security Conference Role-Based Access Control D.Ferraolo;R. Kuhn
  7. Web Security and Commerce S. Garfinkel
  8. Proceedings of the 15th National Computer Security Conference Operating System Support for Trusted Applications R. Graubart
  9. Communications of ACM v.19 no.8 Protection in Operating Systems M. Harrison (et al.)
  10. Technical report MD A904-97-C-3047 CDRL A003 Assurance in the Fluke Microkernel: Formal Security Policy Model Secure Computing Corporation
  11. Information Warefare and Security Dorothy E, Denning