|
1 @article{guttman2005verifying, |
|
2 title={{V}erifying {I}nformation {F}low {G}oals in {S}ecurity-{E}nhanced {L}inux}, |
|
3 author={J.~D.~Guttman and A.~L.~Herzog and J.~D.~Ramsdell and C.~W.~Skorupka}, |
|
4 journal={Journal of Computer Security}, |
|
5 volume={13}, |
|
6 number={1}, |
|
7 pages={115-134}, |
|
8 year={2005}, |
|
9 publisher={IOS Press} |
|
10 } |
|
11 |
|
12 |
|
13 @inproceedings{ottrc, |
|
14 author = {A.~Ott}, |
|
15 title = {{T}he {R}ole {C}ompatibility {S}ecurity {M}odel}, |
|
16 booktitle = {Proc.~of the 7th Nordic Workshop on Secure IT Systems (NordSec)}, |
|
17 year = {2002} |
|
18 } |
|
19 |
|
20 @phdthesis{ottthesis, |
|
21 author = {A.~Ott}, |
|
22 title = {{M}andatory {R}ule {S}et {B}ased {A}ccess {C}ontrol in {L}inux: {A} |
|
23 {M}ulti-{P}olicy {S}ecurity {F}ramework and {R}ole {M}odel {S}olution for |
|
24 {A}ccess {C}ontrol in {N}etworked {L}inux {S}ystems}, |
|
25 year = {2007}, |
|
26 school = {University of Hamburg} |
|
27 } |
|
28 |
|
29 @Unpublished{ottweb, |
|
30 author = {A.~Ott and S.~Fischer-H\"ubner}, |
|
31 title = {{A} {R}ole-{C}ompatibility {M}odel for {S}ecure {S}ystem {A}dministration}, |
|
32 note = {\url{http://www.rsbac.org/doc/media/rc-paper.php}} |
|
33 } |
|
34 |
|
35 @article{Jha08, |
|
36 author = {S.~Jha and |
|
37 N.~Li and |
|
38 M.~V.~Tripunitara and |
|
39 Q.~Wang and |
|
40 W.~H.~Winsborough}, |
|
41 title = {{T}owards {F}ormal {V}erification of {R}ole-{B}ased |
|
42 {A}ccess {C}ontrol {P}olicies}, |
|
43 journal = {IEEE Transactions Dependable and Secure Computing}, |
|
44 volume = {5}, |
|
45 number = {4}, |
|
46 year = {2008}, |
|
47 pages = {242--255} |
|
48 } |
|
49 |
|
50 @INPROCEEDINGS{sanity01, |
|
51 author = {B.~Sarna-Starosta and S.~D.~Stoller}, |
|
52 title = {{P}olicy {A}nalysis for {S}ecurity-{E}nhanced {L}inux}, |
|
53 booktitle = {Proc.~of the 2004 Workshop on Issues in the Theory of Security (WITS)}, |
|
54 year = {2004}, |
|
55 pages = {1--12} |
|
56 } |
|
57 |
|
58 @inproceedings{sanity02, |
|
59 author = {E.~Uzun and |
|
60 V.~Atluri and |
|
61 S.~Sural and |
|
62 J.~Vaidya and |
|
63 G.~Parlato and |
|
64 A.~L.~Ferrara and |
|
65 P.~Madhusudan}, |
|
66 title = {{A}nalyzing {T}emporal {R}ole {B}ased {A}ccess {C}ontrol {M}odels}, |
|
67 booktitle = {Proc.~of the 17th ACM Symposium on Access Control Models and Technologies |
|
68 (SACMAT)}, |
|
69 year = {2012}, |
|
70 pages = {177--186} |
|
71 } |
|
72 |
|
73 @inproceedings{Archer03, |
|
74 author = {M.~Archer and |
|
75 E.~I.~Leonard and |
|
76 M.~Pradella}, |
|
77 title = {{A}nalyzing {S}ecurity-{E}nhanced {L}inux {P}olicy |
|
78 {S}pecifications}, |
|
79 booktitle = {Proc.~of the 4th IEEE International Workshop on Policies |
|
80 for Distributed Systems and Networks (POLICY)}, |
|
81 year = {2003}, |
|
82 pages = {158--169} |
|
83 } |
|
84 |
|
85 @inproceedings{ZhangUrbanWu12, |
|
86 author = {X.~Zhang and C.~Urban and C.~Wu}, |
|
87 title = {{P}riority {I}nheritance {P}rotocol {P}roved {C}orrect}, |
|
88 booktitle = {Proc.~of the 3rd Conference on Interactive Theorem Proving (ITP)}, |
|
89 year = {2012}, |
|
90 pages = {217--232}, |
|
91 series = {LNCS}, |
|
92 volume = {7406} |
|
93 } |
|
94 |
|
95 @inproceedings{Wang09, |
|
96 author = {J.~Wang and H.~Yang and X.~Zhang}, |
|
97 title = {{L}iveness {R}easoning with {I}sabelle/{HOL}}, |
|
98 booktitle = {Proc.~of the 22nd International Conference on Theorem Proving in |
|
99 Higher Order Logics (TPHOLs)}, |
|
100 year = {2009}, |
|
101 pages = {485--499}, |
|
102 volume = {5674}, |
|
103 series = {LNCS} |
|
104 } |
|
105 |
|
106 @Article{Paulson98, |
|
107 author = {L.~C.~Paulson}, |
|
108 title = {{T}he {I}nductive {A}pproach to {V}erifying {C}ryptographic {P}rotocols}, |
|
109 journal = {Journal of Computer Security}, |
|
110 year = {1998}, |
|
111 volume = {6}, |
|
112 number = {1--2}, |
|
113 pages = {85--128} |
|
114 } |