11.06.2015 Views

o_19nhsmha01vhpfpg1knut7kcn4a.pdf

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Badger et al., 1995] Badger, L., Sterne, D. F., Sherman, D. L., Walker, K. M., and<br />

Haghighat, S. A. (June 1995). A domain and type enforcement unix prototype. Unix<br />

Security Sympo-sium Proceedings.<br />

[Coker, eorg] Coker, F. (2004, note=http://lurking-grue.org). Getting started with selinux<br />

how-to: the new selinux.<br />

[Coker and Coker, 2005] Coker, F. and Coker, R. (2005). Taking advantadge of selinux.<br />

[Ferraiolo and Khun, 1992] Ferraiolo, D. and Khun, R. (1992). Role-based access control.<br />

Pro-ceedings 15th National Computer Security Conference.<br />

[Frank Mayer and Caplan, 2006] Frank Mayer, K. M. and Caplan, D. (2006). SELinux by<br />

Example: Using Security Enhanced Linux. Prentice Hall.<br />

[Laudon, 2012] Laudon, K. C. (2012). Sistemas de Información Gerencial . Pearson.<br />

[Loscoco and Smalley, 2001] Loscoco, P. and Smalley, S. (2001). Integrating flexible<br />

support for security policies into linux operating system. NSA.<br />

[Loscoco et al., 2000] Loscoco, P., Smalley, S., Muckelbauer, P. A., and Taylor, R. C. (2000).<br />

The inetability of failure: The flawed assumption of the secu rity in moderm computer<br />

envi-roments. NSA.<br />

[McCarty, 2004] McCarty, B. (2004). SELinux NSA's Open Source Security Enhanced Linux.<br />

O'Reilly.<br />

[Obrien, 2006] Obrien, J. A. (2006). Sistemas de Información Gerencial . McGrawHill.<br />

[R. et al., 1999] R., S., S.D., S., P., L., M., H., D., A., and J., L. (August 1999). The flask<br />

security architecture: System support for diverse security policies. Proceedings of the 8th<br />

USENIX Security Simposium.<br />

[SELinux, 2006] SELinux (2006). Selinux symposium. http://www.selinux-symposium.org.<br />

[Stephen2005, 2005] Stephen2005 (2005). Configuring the se linux policy. Technical report.<br />

[Walsh, 2005] Walsh, D. (2005). Targeted vs strict policy history and strategy. Security Enhanced<br />

Linux Symposium.<br />

[Walsh, 2003] Walsh, D. J. (2003). Selinux targeted vs strict policy.<br />

[Zanin and Mancini, 2004] Zanin, G. and Mancini, L. V. (June 2004). Towards a formal<br />

model for security policies specification and validation in the se linux system. SACMAT<br />

04 New York USA.<br />

2961

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!