1 |
Immunix, http://immunix.org/
|
2 |
Bell. D. and Lapadula, 'Secure Computer System: Mathematical Foundations and Model,' MITRE Report MTR 2547, v2 Nov 1973
|
3 |
R. Magnus et al, LINUX KERNEL INTERNALS, 1999
|
4 |
Peter A. Loscocco et al., The Inevitability of Failure: The Flawed Assumption of Security in Modem Computing Environments, 21st NISSC, 1998
|
5 |
Sue Hildreth, ASP Security: Why Firewall Are Not Enough, http://www.ebizQ.net, 2001.2
|
6 |
ISO/IEC lTCl/SC27, Information Technology-Security Techniques - Security Information Object, N2315, 1999
|
7 |
Thomas H. Ptacek et al., Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, NAI Lab., 1998.1
|
8 |
Http://www.police.go.kr 경찰청 사이버테러 대응센터 보도자료
|
9 |
ISO/lEC 15408 Common Criteria, commoncriteria.org 1999. 8
|
10 |
http://www.radium.ncsc.mil/tpep/epl
|
11 |
Dixie B. Baker, Fortresses Built Upon Sand, ACM Proc. of the New Security Paradigms Work-shop, 1996
DOI
|
12 |
Charles P. Pfleeger, Security in Computing, PTR, 1997
|
13 |
DoD, Trusted Computer System Evaluation Criteria, DoD 5200.28. STD, 1985
|
14 |
D. D. Downs et al., 'Issues in Discretionary Access Control,' Proc. of IEEE Symposium on Security and Privacy, pp. 208-218, 1985
DOI
|
15 |
Charles W. Flink II et al., 'System V/MLS Labeling and Mandatory Policy Alternatives,' Proc. of USENIX-Winter'89, pp. 413-427, 1989
|
16 |
Security Enhanced Linux, http://www.nsa.gov/selinux
|
17 |
Paul C. Clark, Policy-Enhanced Linux, 23rd NISSC, 2000
|
18 |
Federal Register/Vol.65, No.10/Rules & Regulationt(Part III: Dept. of Commerce, Bureau of Export Administration, Revision to Encryption Items;Interim Final Rule, Jan. 14, 2000)
|
19 |
Computer Associates, eTrust Access Control for UNIX, 2001
|
20 |
IEEE Std 1003.2c-Draft standard fot Information Technology Portable Operating System Interface(POSIX) Part 2: Shell and Utilities : Protection and Control Interfaces
|
21 |
http://www.cs.utah.edu/flux/fluke
|