Configuring the SELinux Policy | ||
---|---|---|
Prev |
[BoebertNCSC1985] W. Boebert and R. Kain, "A Practical Alternative to Hierarchical Integrity Policies", Proceedings of the Eighth National Computer Security Conference, 1985.
[FerraioloNCSC1992] David Ferraiolo and Richard Kuhn, "Role-Based Access Controls", Proceedings of the 15th National Computer Security Conference, October 1992.
[LoscoccoFreenix2001] Peter Loscocco and Stephen Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System", Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, The USENIX Association, June 2001.
[LoscoccoOLS2001] Peter Loscocco and Stephen Smalley, "Meeting Critical Security Objectives with Security-Enhanced Linux", Proceedings of the 2001 Ottawa Linux Symposium, July 2001.
[LoscoccoNSATR2001] Peter Loscocco and Stephen Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System", NSA Technical Report, February 2001.
[SmalleyNAITR2001] Stephen Smalley and Timothy Fraser, "A Security Policy Configuration for the Security-Enhanced Linux", NAI Labs Technical Report, February 2001.
[SmalleyModuleTR2001] Stephen Smalley, Chris Vance, and Wayne Salamon, "Implementing SELinux as a Linux Security Module", NAI Labs Report #01-043, December 2001.