참고문헌
- Proc. of NETSEC-KR 2002 The Technology of Secure Operating System for Secure Networking J.N.Kim;S.W.Sohn
- Proc. of WISA2001, The Second International Workshop on Information Security Applications Access Control for Secure FreeBSD Operating System J.G.Ko;J.N.Kim;K.I.Jeong
- The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco;Wtephen D. Dmalley;Patric A. Muckelbauer;Ruth C. Taylor;S.Jeff Truner;JohnF. Farrel
- MITRE Technical Report 2997 Secure computer system: Unified exposition and multics interpretation Bell, David Elliott;Leonard J. La Padula
- ACM transaction on Information and System Security v.4 no.3 A Proposed Standard for Role-Based Access Control David F. Ferraiolo;Ravi Sandu;Serban Gavrila
- Proceeding of th 8th USENIX Security Symposium The Flask Security Architecture : System Support for diverse Security Policies Ray Spencer;Stephen Smalley;Peter Loscocco;Mike Hibler;Dave,Anderson;Jay Lepreau
- UNICOS Multilevel Security(MLS) Features Users Guide, SG-21111 10.0
- DOD 5200.28-STD Department of Defense Trusted Computer System Evaluation Criteria
- Proceeding of the 15th National Computer Security Conference Role-Based Access Control D.Ferraolo;R.Kuhn
- Proceedings of the 15th National Computer Security Conference Operating System Support for Trusted Applications R.Graubart
- Communications of ACM v.19 no.8 Protection in Operating Systems M.Harrison(et al.)
- Technical report MD A904-97-C-3047 CDRL A003 Assurance in the Fluke Microkernel:Formal Securith Policy Model Secure Computing Corporation
- Information Warfare and Security Dorothy E. Denning
- WISA2000 v.1 no.1 Design and Implementation for Secure OS based on Linux J.G.Ko;S.Y.Doo;S.K.Un;J.N.Kim