Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
127 | Yi-Ming Chen 0008, Yung-Wei Kao |
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 389-404, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information flow, security policy, Colored Petri Nets, SELinux |
119 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 91-100, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy compliance, SELinux, policy analysis, multi-level security |
101 | Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang |
Design and implementation of a tool for analyzing SELinux secure policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 446-451, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security policy configuration, security policy description language, SELinux, integrity verification |
92 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 7-14, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
87 | Gail-Joon Ahn, Dhruv Gami |
Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 865-870, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Björn Vogel, Bernd Steinke |
Using SELinux security enforcement in Linux-based embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008, pp. 15, 2008, 978-1-59593-984-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, embedded system, SELinux |
79 | Arpan Darivemula, Chokchai Leangsuksun, Anand Tikotekar, Makan Pourzandi |
Work in Progress: RASS Framework for a Cluster-Aware SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 29, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Giorgio Zanin, Luigi V. Mancini |
Towards a formal model for security policies specification and validation in the selinux system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 136-145, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security enhanced linux, configuration, formal model |
66 | Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang |
Systematic Policy Analysis for High-Assurance Services in SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 3-10, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SELinux, Policy Analysis |
61 | Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 343-348, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger |
Measuring integrity on mobile phone systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 155-164, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile phones, SELinux, integrity measurement |
52 | Takashi Horie, Toshiharu Harada, Kazuo Tanaka |
Adaptive Access Policy for the Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy, pp. 82-88, 2005, IEEE Computer Society, 0-7695-2262-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
A System for Distributed SELinux Policy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 254-261, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access, distributed, control, policies, administration, Kerberos, SELinux |
49 | Masoom Alam, Jean-Pierre Seifert, Qi Li 0002, Xinwen Zhang |
Usage control platformization via trustworthy SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 245-248, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, usage control, SELinux |
49 | Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
Automated Process Classi?cation Framework using SELinux Security Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 592-596, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pcss, process classification using selinux security context, process classification framework, selniux |
44 | Berthold Agreiter, Ruth Breu |
Model-Driven Configuration of SELinux Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 887-904, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn |
Visualization based policy analysis: case study in SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 165-174, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono |
Simplifying security policy descriptions for internet servers in secure operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 326-333, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
policy description, SELinux, internet server, secure operating system |
40 | Vikhyath Rao, Trent Jaeger |
Dynamic mandatory access control for multiple stakeholders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 53-62, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, selinux, distributed access control |
40 | Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
Analysis of virtual machine system policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 227-236, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
xen security modules (xsm), virtual machines, selinux, policy analysis |
40 | SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han |
Design and Implementation of Fast Access Control That Supports the Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 211-224, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Flask, Access control, RBAC, SELinux, DAC |
40 | Vinod Ganapathy, Trent Jaeger, Somesh Jha |
Automatic placement of authorization hooks in the linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 330-339, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
LSM, hook placement, static analysis, SELinux |
35 | Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari |
Team--Based MAC Policy over Security--Enhanced Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 41-46, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji Sakai, Masato Edahiro |
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2005, Jersey City, NJ, USA, September 19-21, 2005, pp. 178-183, 2005, ACM, 1-59593-161-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
secure mobile terminal, chip multiprocessor, linux |
35 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 |
Resolving constraint conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 105-114, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control models, constraint models, policy design |
35 | Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards |
Policy management using access control spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(3), pp. 327-364, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
26 | Divyam Pahuja, Alvin Tang, Klim Tsoutsman |
Automated SELinux RBAC Policy Verification Using SMT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04586, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin |
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.15915, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin |
IFCIL: An Information Flow Configuration Language for SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022, pp. 243-259, 2022, IEEE, 978-1-6654-8417-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yan Ding, Pan Dong, Zhipeng Li, Yusong Tan, Chenlin Huang, Lifeng Wei, Yudan Zuo |
SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2020, pp. 8866996:1-8866996:12, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas |
Consistency analysis and flow secure enforcement of SELinux policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 94, pp. 101816, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Jae-Yong Ko, Sang-Gil Lee, Cheol-Hoon Lee |
Real-time Mandatory Access Control on SELinux for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2019, Las Vegas, NV, USA, January 11-13, 2019, pp. 1-6, 2019, IEEE, 978-1-5386-7910-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar |
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings, pp. 219-231, 2018, Springer, 978-3-319-95728-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Xin-long Song, Chung-Huang Yang |
Mobile Device Management System Based on AOSP and SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 417-420, 2017, IEEE Computer Society, 978-1-5386-1600-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Amir Eaman, Bahman Sistany, Amy P. Felty |
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Embracing the Internet of Things - 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings, pp. 116-135, 2017, 978-3-319-59040-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Robert Gove |
V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 13th IEEE Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016, pp. 1-8, 2016, IEEE Computer Society, 978-1-5090-1605-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi |
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 23(5), pp. 664-672, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Simone Mutti, Enrico Bacis, Stefano Paraboschi |
An SELinux-based intent manager for Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015, pp. 747-748, 2015, IEEE, 978-1-4673-7876-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Peter Amthor 0001 |
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 88-99, 2015, SciTePress, 978-989-758-117-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Gaoshou Zhai, Tao Guo, Jie Huang |
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 294-309, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Michele Paolino, Mian Muhammad Hamayun, Daniel Raho |
A Performance Analysis of ARM Virtual Machines Secured Using SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 28-36, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn |
Visualization-based policy analysis for SELinux: framework and user study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 12(3), pp. 155-171, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Ananya Chatterjee, Arun Mishra |
Securing the Root Through SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACNI ![In: Intelligent Computing, Networking, and Informatics, Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, ICACNI 2013, Raipur, Chhattisgarh, India, 12-14 June 2013, pp. 653-659, 2013, Springer, 978-81-322-1664-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne |
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 6(1), pp. 57-76, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Patrice Clemente, Bangaly Kaba, Jonathan Rouzaud-Cornabas, Marc Alexandre, Guillaume Aujay |
SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology - 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012. Proceedings, pp. 596-605, 2012, Springer, 978-3-642-35235-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne |
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 14(2), pp. 19:1-19:28, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf |
Encoding default-based SELinux-security policy in Organization-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 608-613, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
26 | Said Marouf, Mohamed Shehab |
SEGrapher: Visualization-based SELinux Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck |
Model-based safety analysis of SELinux security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 208-215, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 13(3), pp. 26:1-26:31, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi |
SELinux Security Policy Configuration System with Higher Level Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 18, pp. 201-212, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Asaf Shabtai, Yuval Fledel, Yuval Elovici |
Securing Android-Powered Mobile Devices Using SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(3), pp. 36-44, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Linda Markowsky |
An SELinux Sourcebook for Cybersecurity Educators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 248-254, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
26 | Jaroslav Janácek |
Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT (1) ![In: Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I, pp. 259-272, 2010, Springer, 978-3-642-14291-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Said Marouf, Doan Minh Phuong, Mohamed Shehab |
A learning-based approach for SELinux policy optimization with type mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, pp. 70, 2010, ACM, 978-1-4503-0017-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard |
Classification of Malicious Distributed SELinux Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 4(5), pp. 423-432, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Mathieu Blanc, Patrice Clemente, Steve-William Kissi |
Toward a real MLS/SELinux system for end users: An empirical study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, Baltimore, Maryland, USA, May 18-22, 2009, pp. 209-216, 2009, IEEE Computer Society, 978-1-4244-4584-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Machon B. Gregory, Angela S. Reninger |
Teaching SELinux in Introductory Information Assurance Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), Proceedings (CD-ROM and online), 5-8 January 2009, Waikoloa, Big Island, HI, USA, pp. 1-8, 2009, IEEE Computer Society, 978-0-7695-3450-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Tabata |
SEEdit: SELinux Security Policy Configuration System with Higher Level Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, USA, pp. 107-117, 2009, USENIX Association, 978-1-931971-71-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Peter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu |
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedInfo ![In: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems, 20-24 August, 2007, Brisbane, Australia, pp. 498-502, 2007, IOS Press, 978-1-58603-774-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bill MacCarty |
SELinux - NSA's open source security enhanced linux: beating the o-day vulnerability threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2005 |
RDF |
|
26 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 |
Analyzing Integrity Protection in the SELinux Example Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
26 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux A Technology Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 4-6, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 170-175, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Asaf Shabtai |
Malware Detection on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Data Management ![In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23-26 May 2010, pp. 289-290, 2010, IEEE Computer Society, 978-0-7695-4048-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Mobile Devices, Malware, Android, SELinux |
22 | Hiroaki Inoue, Junji Sakai, Sunao Torii, Masato Edahiro |
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 8(1), pp. 1:1-1:16, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure mobile terminal, chip multiprocessor, SELinux |
22 | Berthold Agreiter |
Model-driven configuration of os-level mandatory access control: research abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, Companion Volume, pp. 995-998, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
selinux, mac, model-driven security |
22 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 42-50, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
17 | Boniface Hicks, Sandra Julieta Rueda, Dave King 0002, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger |
An architecture for enforcing end-to-end access control over web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 163-172, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
policy compliance, access control |
17 | Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger |
Flexible security configuration for virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 35-44, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, virtual machines, policy, compliance |
17 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu |
Security Enforcement Model for Distributed Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 10-18, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 164-185, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
17 | Hao Hu, Dengguo Feng |
BIFI: Architectural Support for Information Flow Integrity Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 605-609, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | William J. Caelli |
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 433-442, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith |
Pastures: Towards Usable Security Policy Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1052-1059, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang |
A Model-Driven Framework for Trusted Computing Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, pp. 75-86, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 55-66, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
17 | Trent Jaeger, Reiner Sailer, Umesh Shankar |
PRIMA: policy-reduced integrity measurement architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 19-28, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Clark-Wilson Lite integrity, information flow, remote attestation |
17 | Elizabeth I. Leonard, Myla Archer |
Extended abstract: organizing automaton specifications to achieve faithful representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEMOCODE ![In: 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 11-14 July 2005, Verona, Italy, Proceedings, pp. 245-246, 2005, IEEE Computer Society, 0-7803-9227-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Lawrence Teo, Gail-Joon Ahn |
Supporting access control policies across multiple operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 288-293, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Chameleos, access control, operating systems, flexibility, extensibility, policy specification |
17 | Matthew Johnson 0003, Frank Stajano |
Implementing a Multi-hat PDA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 295-307, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 294-303, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|