1 |
/
|
2 |
/
|
3 |
/
|
4 |
/
|
5 |
System V/MLS Labeling and Mandatory Policy Alternatives
/
|
6 |
/
|
7 |
/
|
8 |
/
|
9 |
/
|
10 |
/
|
11 |
/
|
12 |
리눅스 커널의 특징
/
과학기술학회마을 |
13 |
/
|
14 |
Linux Security Module Framework
/
|
15 |
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
/
|
16 |
/
|
17 |
Imbench: Portable Tools for Performance Analysis
/
|
18 |
Fortresses Built Upon Sand
/
|
19 |
/
|
20 |
Trusted Computer System Evaluation Criteria
/
|
21 |
/
|
22 |
/
|
23 |
/
|
24 |
Policy-Enhanced Linux
/
|
25 |
/
|
26 |
/
|
27 |
SubDomain: Parsimonius Server Security
/
|
28 |
/
|
29 |
Secure Computer System: Mathematical Foundations and Model
/
|
30 |
Issues in Discretionary Access Control
/
|