References
- Amon O., Simone F.H.. 'The 'Rule Set Based Access Control' (RSBAC) Framework for Linux.' Karlstad University Studies, 2001
- Baldwin, R.W., 'Naming and Grouping Privileges to Simplify Security Management in Large Databases,' IEEE Symposium on Computer Security and Privacy, 1990
- Bell, D.E., and La Padular. L.J., Secure Computer Systems: mathematical foundations. Technical Report M74244, MITRE Corp., vol.1-2, 1974,(10) vol.1-2, 1974.[10] vol.1-2, 1974
- Bell, D.E.. and La Padular. L.J., Secure Computer Systems: unified exposition and Multics interpretation, MITRE Corp.. 1975
- Biba, KJ., Integrity Considerations for Secure Computer Systems, MTR-3153, MITRE Corp., 1977
- Biba, K.J., Integrity Considerations for Secure Computer Systems, U.S. Air Force Electronic Systems Division
- Castano. S., et al.. Database Security, Addition-Wesley, pp. 18-34, 1994
- D. Gollmann, 'Computer Security,' John Wiley & SONS, 1999
- Int'l Standards Organization(ISO), 'Working Draft on Access Control Framework,' ISO/IEC JTC 1/SC 21 N5045, 1990
- ITU-T SG/7 & Working Parties, 'Final text for recommendation X.812 Information Technology-Open Systems interconnection Security framework for open systems: Access control framework,' 1995
- James M., Stephen S., Greg K.H., 'Linux Security Modules: General Security Support for the Linux Kernel', USENIX Security Symposium,' 2002
- Lee B., Daniel F.S .. David L.S .. Kenneth M. W .. and Sheila AB., 'A Domain and Type Enforcement UNIX Prototype,' Fifth USENIX UNIX Security Symposium, 1995
- L.LaPadula, 'Rule-Set Modeling of Trusted Computer System', Essay 9 in: M.Abrams, S.Jajodia, H. Podell. 'Information Security - An integrated Collection of Essays, ' IEEE Computer Society Press, 1995
- Magdalena B., Hari B., Jon S., Mike S., 'The Medusa Distributed Stream Processing System,' MIT Computer Science and Artificial Intelligence Lab, 2003
- Medusa DS9, http://medusa.fornax.sk
- Sandhu, R.S., 'Role Hierarchies and Constraints for Lattice Based Access Controls,' Processing of the 4th European Symposium on Research in Computer Security, Sep. 1996
- SELinux, http://www.nsa.gov/selinux
- U.S. Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200. 28-STD, National Computer Security Center, Dec. 1985
- 김정녀, 손승원, 이철훈, '안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험', 정보처리학회논문지 D 제10-D권 제5호(2003.8)
- 김정녀, 정교일, 이철훈, '리눅스 시스템의 버퍼 오버플로우 공격 대응 기법'. 정보처리학회논문지 A 제8-A권 제4호(2001. 12)
- 손형길, 박태규, 이금석, '리눅스 운영체제 기반의 보안 커널 구현'. 정보처리학회논문지 C 제10-C권 제2호(2003.4)
- 신욱, 이동익, 김형천, 강정민, 이진석, '보안운영체제를 위한 확장된 역할기반 접근통제 기법'. 한국정보처리학회 추계학술발표대회 논문집 제10권 제2호(2003. 11)
- 한국정보보호센터, '정보보호시스템 평가.인증 가이드'. 2000. 12
- 홍철호, '오픈 소스 보안운영체제의 성능평가에 대한 연구'. 한국정보보호학회, 2002