References
- 한국정보보호진흥원, '2001년 상반기 해킹. 바이러스 분석 보고서,' 2001
- NIST, 'An Introduction to Computer Security : The NIST Handbook,' June 20, 1994
- Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckel-bauer, Ruth C. Taylor, S. Jeff Turner, John F. Farrell, 'The Inevitability of Failure : The Flawed Assumption of Security in Modern Computing Environments,' Technical report, United Stated National Security Agency (NSA), 1995
- Bill Neugent, 'Where We Stand in Multilevel Security (MLS) : Requirements, Approaches, Issues, and Lessons Learned,' Computer Security Applications Conference, 1994
- Len Lapadula, 'Secure Computer Systems : Mathematical Foundations,' MITRE Techical Report, Vol. I, 1996
- Len Lapadula, 'Secure Computer Systems : Mathematical Foundations,' MITRE Technical Report, Vol.II, 1996
- Carl E. Landwehr, 'Formal Models for Computer Security,' ACM Computing Surveys, Vol.13, No.3, 1981 https://doi.org/10.1145/356850.356852
- Carl E. Landwehr, Constance L. Heitmeyer, and John McLean, 'A Security Model for Military Message Systems,' ACM Trans., Aug. 1984 https://doi.org/10.1145/989.991
- Frank L. Mayer, 'An Interpretation of a Refined Bell-La Padula Model For the TMach Kernel,' Aerospace Computer Security Applications Conference, 1988 https://doi.org/10.1109/ACSAC.1988.113335
- John McLean, 'The Specification and Modeling of Computer Security,' Computer, Volume : 23, Issue : 1, 1990 https://doi.org/10.1109/2.48795
- DOD 5200.28-STD, 'Trusted Computer System Evaluation Criteria', December 1985
- 홍기융, 외, '안전한 운영체제를 위한 MAC메커니즘의 설계 및 구현,' 한국정보과학회 가을학술발표논문집, Vol.17, No.2, 1990
- Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckel-bauer, Ruth C. Taylor, S. Jeff Turner, John F. Farrell, 'Integrating Flexible Support for Security Policies into the Linux Operating System,' Technical repot, United Stated National Security Agency (NSA), 2000
- Warwick Ford, 'Computer Communications Security,' Prentice Hall, 1994
- Edward G. Amoroso, 'Fundamentals Of Computer Security Technology,' Prentice Hall, 1994
- Dieter Gollman, 'Computer Security,' Jone Wiley & Sons, 1999
- Michael V. Joyce, 'Access Control and Applications on Trusted Systems,' Computer Security Applications Conference, 1992 https://doi.org/10.1109/CSAC.1992.228223
- R.S. Sandhu, and P. Samarati, 'Access Control : Principles and Practices,' IEEE Communications, 1994
- R.S. Sandhu, and P. Samarati, 'Authentication, Access Control, and Audit,' ACM Computer Survey, 28, 1, 1996 https://doi.org/10.1145/234313.234412
- David Ferraiolo and Richard Kuhn, 'Role-Based Access Control,' Proceedings of 15th National Computer Security Conference, 1992
- D. Ferraiolo, J. Cugini, and K. Richard, 'Rold-Based Access Control (RBAC) : Features and Motivations,' In Proc. of the Annual computer Security Applications Conference, 1995
- R. Sandhu, E. Coyne, H. Feinstein, 'Role-Based Access Control Models,' Computer 29(2), 1996 https://doi.org/10.1109/2.485845
- Raymond M. Wong, 'A Comparison of Secure UNIX Operating Systems,' Computer Security Appplication Conference, 1990 https://doi.org/10.1109/CSAC.1990.143794
- http://www.rsbac.de
- http://www.nsa.gov/selinux/
- 강정민, 신 욱, 박춘구, 이동익, '프로세스 신뢰도에 기반한 확장된 BLP 보안 모델과 아키텍쳐 설계,' 한국정보과학회 춘계학술대회논문집, 2001
- Daniel F. Stern, and Glenn S. Benson, 'Redrawing the Security Perimeter of a Trusted System,' Computer Security Foundations Workshop VII, 1994 https://doi.org/10.1109/CSFW.1994.315938
- ITU-T, 'Security Frameworks For Open Systems : Access Control Framework,' ITU-T Recommendation X.812, 1996
- Grenier, G.-L. : Holt, R.C. ; Funkenhauser, M., 'Policy VS. Mechanism in the Secure TUNIS Operating System,' Proceedings. of IEEE Symposium on Securtiy and Privacy, 1989 https://doi.org/10.1109/SECPRI.1989.36280
- A. Rubini and J. Corbet, 'Linux Device Drivers,' O'REILLY, 2001
- D.P. Bovet and M. Cesati, 'Understanding Linux Kernel,' O'REILLY, 2001