1 |
http://www.radium.ncsc.mil/tpep/library/tcsec/index.html
|
2 |
Jong Gook Ko, Jeong Nyeo Kim, and Kyo Il Jeong, 'Access Control for Secure FreeBSD Operating System,' WISA2001, Vol. 2, 2001
|
3 |
IEEE Std 1003.1e-Draft standard for information Technology-portable Operating System Interface(POSIX)Part 1:System Application Program Interface(API)-Protection, Audit and Control Interfaces
|
4 |
IEEE Std 1003.2c-Draft standard for information Technology-Portable Operating System Interface(POSIX)Part 2 : Shell and Utilities: Protection and Control Interfaces
|
5 |
Rule Set Based Access Control, http://www.rsbac.de
|
6 |
Roos Lindgreen, Herschberg I.S., 'On the Validity of the Bell-Lapadula model,' Computer & Security, Vol.13, pp. 317-338, 1994
DOI
ScienceOn
|
7 |
David A. Wheeler, 'Secure Programming for LINUX and UNIX HOWTO,' http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/book1.html
|
8 |
Santosh Chokhani, 'Trusted Products Evaluation,' Communications of the ACM, Vol.35, No. 7, July, 1992
DOI
|
9 |
Raymon M. Wong, 'A Comparision of Secure UNIX Operating System,' IEEE, 1990
DOI
|
10 |
Simon Wiseman, Phill Terry, Andrew Wood, 'The Trusted Path between SMITE and the User,' British Crown Copyright, 1988
DOI
|
11 |
Jeremy Epstein, John Mchugh, Rita Pascale, 'A Prototype B3 Trusted X Window System,' IEEE, 1991
DOI
|