author | Christian Urban <christian dot urban at kcl dot ac dot uk> |
Thu, 25 Dec 2014 15:54:08 +0000 | |
changeset 21 | 17ea9ad46257 |
parent 16 | a5f4dc4bbc5d |
permissions | -rwxr-xr-x |
2 | 1 |
@article{guttman2005verifying, |
2 |
title={{V}erifying {I}nformation {F}low {G}oals in {S}ecurity-{E}nhanced {L}inux}, |
|
3 |
author={J.~D.~Guttman and A.~L.~Herzog and J.~D.~Ramsdell and C.~W.~Skorupka}, |
|
4 |
journal={Journal of Computer Security}, |
|
5 |
volume={13}, |
|
6 |
number={1}, |
|
7 |
pages={115-134}, |
|
8 |
year={2005}, |
|
9 |
publisher={IOS Press} |
|
10 |
} |
|
11 |
||
12 |
||
13 |
@inproceedings{ottrc, |
|
14 |
author = {A.~Ott}, |
|
15 |
title = {{T}he {R}ole {C}ompatibility {S}ecurity {M}odel}, |
|
16 |
booktitle = {Proc.~of the 7th Nordic Workshop on Secure IT Systems (NordSec)}, |
|
17 |
year = {2002} |
|
18 |
} |
|
19 |
||
20 |
@phdthesis{ottthesis, |
|
21 |
author = {A.~Ott}, |
|
22 |
title = {{M}andatory {R}ule {S}et {B}ased {A}ccess {C}ontrol in {L}inux: {A} |
|
23 |
{M}ulti-{P}olicy {S}ecurity {F}ramework and {R}ole {M}odel {S}olution for |
|
24 |
{A}ccess {C}ontrol in {N}etworked {L}inux {S}ystems}, |
|
25 |
year = {2007}, |
|
26 |
school = {University of Hamburg} |
|
27 |
} |
|
28 |
||
29 |
@Unpublished{ottweb, |
|
30 |
author = {A.~Ott and S.~Fischer-H\"ubner}, |
|
31 |
title = {{A} {R}ole-{C}ompatibility {M}odel for {S}ecure {S}ystem {A}dministration}, |
|
32 |
note = {\url{http://www.rsbac.org/doc/media/rc-paper.php}} |
|
33 |
} |
|
34 |
||
35 |
@article{Jha08, |
|
36 |
author = {S.~Jha and |
|
37 |
N.~Li and |
|
38 |
M.~V.~Tripunitara and |
|
39 |
Q.~Wang and |
|
40 |
W.~H.~Winsborough}, |
|
41 |
title = {{T}owards {F}ormal {V}erification of {R}ole-{B}ased |
|
42 |
{A}ccess {C}ontrol {P}olicies}, |
|
43 |
journal = {IEEE Transactions Dependable and Secure Computing}, |
|
44 |
volume = {5}, |
|
45 |
number = {4}, |
|
46 |
year = {2008}, |
|
47 |
pages = {242--255} |
|
48 |
} |
|
49 |
||
50 |
@INPROCEEDINGS{sanity01, |
|
51 |
author = {B.~Sarna-Starosta and S.~D.~Stoller}, |
|
52 |
title = {{P}olicy {A}nalysis for {S}ecurity-{E}nhanced {L}inux}, |
|
53 |
booktitle = {Proc.~of the 2004 Workshop on Issues in the Theory of Security (WITS)}, |
|
54 |
year = {2004}, |
|
55 |
pages = {1--12} |
|
56 |
} |
|
57 |
||
58 |
@inproceedings{sanity02, |
|
59 |
author = {E.~Uzun and |
|
60 |
V.~Atluri and |
|
61 |
S.~Sural and |
|
62 |
J.~Vaidya and |
|
63 |
G.~Parlato and |
|
64 |
A.~L.~Ferrara and |
|
65 |
P.~Madhusudan}, |
|
66 |
title = {{A}nalyzing {T}emporal {R}ole {B}ased {A}ccess {C}ontrol {M}odels}, |
|
67 |
booktitle = {Proc.~of the 17th ACM Symposium on Access Control Models and Technologies |
|
68 |
(SACMAT)}, |
|
69 |
year = {2012}, |
|
70 |
pages = {177--186} |
|
71 |
} |
|
72 |
||
73 |
@inproceedings{Archer03, |
|
74 |
author = {M.~Archer and |
|
75 |
E.~I.~Leonard and |
|
76 |
M.~Pradella}, |
|
77 |
title = {{A}nalyzing {S}ecurity-{E}nhanced {L}inux {P}olicy |
|
78 |
{S}pecifications}, |
|
79 |
booktitle = {Proc.~of the 4th IEEE International Workshop on Policies |
|
80 |
for Distributed Systems and Networks (POLICY)}, |
|
81 |
year = {2003}, |
|
82 |
pages = {158--169} |
|
83 |
} |
|
84 |
||
85 |
@inproceedings{ZhangUrbanWu12, |
|
86 |
author = {X.~Zhang and C.~Urban and C.~Wu}, |
|
87 |
title = {{P}riority {I}nheritance {P}rotocol {P}roved {C}orrect}, |
|
88 |
booktitle = {Proc.~of the 3rd Conference on Interactive Theorem Proving (ITP)}, |
|
89 |
year = {2012}, |
|
90 |
pages = {217--232}, |
|
91 |
series = {LNCS}, |
|
92 |
volume = {7406} |
|
93 |
} |
|
94 |
||
95 |
@inproceedings{Wang09, |
|
96 |
author = {J.~Wang and H.~Yang and X.~Zhang}, |
|
97 |
title = {{L}iveness {R}easoning with {I}sabelle/{HOL}}, |
|
98 |
booktitle = {Proc.~of the 22nd International Conference on Theorem Proving in |
|
99 |
Higher Order Logics (TPHOLs)}, |
|
100 |
year = {2009}, |
|
101 |
pages = {485--499}, |
|
102 |
volume = {5674}, |
|
103 |
series = {LNCS} |
|
104 |
} |
|
105 |
||
106 |
@Article{Paulson98, |
|
107 |
author = {L.~C.~Paulson}, |
|
108 |
title = {{T}he {I}nductive {A}pproach to {V}erifying {C}ryptographic {P}rotocols}, |
|
109 |
journal = {Journal of Computer Security}, |
|
110 |
year = {1998}, |
|
111 |
volume = {6}, |
|
112 |
number = {1--2}, |
|
113 |
pages = {85--128} |
|
114 |
} |
|
16
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
115 |
|
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
116 |
@inproceedings{gran12, |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
117 |
author = {M.~Bugliesi and |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
118 |
S.~Calzavara and |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
119 |
R.~Focardi and |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
120 |
M.~Squarcina}, |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
121 |
title = {{G}ran: {M}odel {C}hecking {G}rsecurity {RBAC} {P}olicies}, |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
122 |
booktitle = {Proc.~of the 25th IEEE Computer Security Foundations Symposium (CSF)}, |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
123 |
year = {2012}, |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
124 |
pages = {126--138} |
a5f4dc4bbc5d
more related work
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
2
diff
changeset
|
125 |
} |