Secure computer systems : Mathematical foundations and model, The MITRE Corporation, 1973. ,
Integrity considerations for secure computer systems, 1975. ,
Piga-hips : Protection of a shared hpc cluster, International Journal on Advances in Security, vol.4, issue.1, pp.44-53, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00671586
A practical alternative to hierarchical integrity policies, The 8th National Computer Security Conference, 1985. ,
Formalization and guaranty of security properties for the operating systems : application to the detection of intrusions, 2007. ,
Labels and event processes in the asbestos operating system, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.17-30, 2005. ,
DOI : 10.1145/1095809.1095813
Role-based access controls, 15th National Computer Security Conference, pp.554-563, 1992. ,
Contrôle d'accès mandataire pour windows 7, Symposium sur la Sécurité des Technologies de l'Information et des Communications 2012, 2012. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Rootkits : Subverting the Windows Kernel, 2005. ,
Integrating flexible support for security policies into the linux operating system, USENIX Annual Technical Conference (FREENIX '01), 2001. ,
Reasoning About Security Models, 1987 IEEE Symposium on Security and Privacy, pp.123-133, 1987. ,
DOI : 10.1109/SP.1987.10020
Modeling the trust boundaries created by securable objects, WOOT'08 : Proceedings of the 2nd conference on USENIX Workshop on offensive technologies, pp.1-7, 2008. ,
:, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.55-66, 2006. ,
DOI : 10.1145/1180337.1180343
The flask security architecture : System support for diverse security policies, Proc. of the Eighth USENIX Security Symposium, pp.123-139, 1999. ,
Making information flow explicit in HiStar, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pp.263-278, 2006. ,
DOI : 10.1145/2018396.2018419