document/root.bib
changeset 2 301f567e2a8e
child 16 a5f4dc4bbc5d
equal deleted inserted replaced
1:dcde836219bc 2:301f567e2a8e
       
     1 @article{guttman2005verifying,
       
     2   title={{V}erifying {I}nformation {F}low {G}oals in {S}ecurity-{E}nhanced {L}inux},
       
     3   author={J.~D.~Guttman and A.~L.~Herzog and J.~D.~Ramsdell and C.~W.~Skorupka},
       
     4   journal={Journal of Computer Security},
       
     5   volume={13},
       
     6   number={1},
       
     7   pages={115-134},
       
     8   year={2005},
       
     9   publisher={IOS Press}
       
    10 }
       
    11 
       
    12 
       
    13 @inproceedings{ottrc,
       
    14   author =       {A.~Ott}, 
       
    15   title =        {{T}he {R}ole {C}ompatibility {S}ecurity {M}odel},
       
    16   booktitle = {Proc.~of the 7th Nordic Workshop on Secure IT Systems (NordSec)},
       
    17   year      = {2002} 
       
    18 }
       
    19 
       
    20 @phdthesis{ottthesis,
       
    21   author    = {A.~Ott},
       
    22   title     = {{M}andatory {R}ule {S}et {B}ased {A}ccess {C}ontrol in {L}inux: {A} 
       
    23                {M}ulti-{P}olicy {S}ecurity {F}ramework and {R}ole {M}odel {S}olution for 
       
    24                {A}ccess {C}ontrol in {N}etworked {L}inux {S}ystems},
       
    25   year      = {2007},
       
    26   school    = {University of Hamburg} 
       
    27 }
       
    28 
       
    29 @Unpublished{ottweb,
       
    30   author = 	 {A.~Ott and S.~Fischer-H\"ubner},
       
    31   title = 	 {{A} {R}ole-{C}ompatibility {M}odel for {S}ecure {S}ystem {A}dministration},
       
    32   note = 	 {\url{http://www.rsbac.org/doc/media/rc-paper.php}}
       
    33 }
       
    34 
       
    35 @article{Jha08,
       
    36   author    = {S.~Jha and
       
    37                N.~Li and
       
    38                M.~V.~Tripunitara and
       
    39                Q.~Wang and
       
    40                W.~H.~Winsborough},
       
    41   title     = {{T}owards {F}ormal {V}erification of {R}ole-{B}ased 
       
    42                {A}ccess {C}ontrol {P}olicies},
       
    43   journal   = {IEEE Transactions Dependable and Secure Computing},
       
    44   volume    = {5},
       
    45   number    = {4},
       
    46   year      = {2008},
       
    47   pages     = {242--255}
       
    48 }
       
    49 
       
    50 @INPROCEEDINGS{sanity01,
       
    51     author = {B.~Sarna-Starosta and S.~D.~Stoller},
       
    52     title = {{P}olicy {A}nalysis for {S}ecurity-{E}nhanced {L}inux},
       
    53     booktitle = {Proc.~of the 2004 Workshop on Issues in the Theory of Security (WITS)},
       
    54     year = {2004},
       
    55     pages = {1--12}
       
    56 }
       
    57 
       
    58 @inproceedings{sanity02,
       
    59   author    = {E.~Uzun and
       
    60                V.~Atluri and
       
    61                S.~Sural and
       
    62                J.~Vaidya and
       
    63                G.~Parlato and
       
    64                A.~L.~Ferrara and
       
    65                P.~Madhusudan},
       
    66   title     = {{A}nalyzing {T}emporal {R}ole {B}ased {A}ccess {C}ontrol {M}odels},
       
    67   booktitle = {Proc.~of the 17th ACM Symposium on Access Control Models and Technologies
       
    68                (SACMAT)},
       
    69   year      = {2012},
       
    70   pages     = {177--186}
       
    71 }
       
    72 
       
    73 @inproceedings{Archer03,
       
    74   author    = {M.~Archer and
       
    75                E.~I.~Leonard and
       
    76                M.~Pradella},
       
    77   title     = {{A}nalyzing {S}ecurity-{E}nhanced {L}inux {P}olicy 
       
    78                {S}pecifications},
       
    79   booktitle = {Proc.~of the 4th IEEE International Workshop on Policies 
       
    80                for Distributed Systems and Networks (POLICY)},
       
    81   year      = {2003},
       
    82   pages     = {158--169}
       
    83 }
       
    84 
       
    85 @inproceedings{ZhangUrbanWu12,
       
    86   author    = {X.~Zhang and C.~Urban and C.~Wu},
       
    87   title     = {{P}riority {I}nheritance {P}rotocol {P}roved {C}orrect},
       
    88   booktitle = {Proc.~of the 3rd Conference on Interactive Theorem Proving (ITP)},
       
    89   year      = {2012},
       
    90   pages     = {217--232},
       
    91   series    = {LNCS},
       
    92   volume    = {7406}
       
    93 }
       
    94 
       
    95 @inproceedings{Wang09,
       
    96   author    = {J.~Wang and H.~Yang and X.~Zhang},
       
    97   title     = {{L}iveness {R}easoning with {I}sabelle/{HOL}},
       
    98   booktitle = {Proc.~of the 22nd International Conference on Theorem Proving in 
       
    99                Higher Order Logics (TPHOLs)},
       
   100   year      = {2009},
       
   101   pages     = {485--499},
       
   102   volume    = {5674},
       
   103   series    = {LNCS}
       
   104 }
       
   105 
       
   106 @Article{Paulson98,
       
   107   author =       {L.~C.~Paulson},
       
   108   title =        {{T}he {I}nductive {A}pproach to {V}erifying {C}ryptographic {P}rotocols},
       
   109   journal =      {Journal of Computer Security},
       
   110   year =         {1998},
       
   111   volume =       {6},
       
   112   number =       {1--2},
       
   113   pages =        {85--128}
       
   114 }