skip to main content
10.5555/647054.715753guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TrustedBSD: Adding Trusted Operating System Features to FreeBSD

Published: 25 June 2001 Publication History

Abstract

No abstract available.

References

[1]
{1} Argus products overview: Pitbull. http://www.argussystems.com/product/ overview/pitbull/.
[2]
{2} L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker. A domain and type enforcement UNIX prototype. In Computing Systems, Winter, 1996., volume 9, Berkeley, CA, USA, Winter 1996. USENIX.
[3]
{3} D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corp., Bedford MA, May 1973.
[4]
{4} K. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, Mitre, Bedford, MA, Apr. 1977.
[5]
{5} N. C. C. I. Board. Common criteria version 2.1 (ISO IS 15408), 2000.
[6]
{6} T. Fraser. LOMAC: MAC You Can Live With. In Proceedings of the USENIX Annual Technical Conference, June 2001.
[7]
{7} FreeBSD Project. FreeBSD home page. http://www.FreeBSD.org/.
[8]
{8} A. Grunbacher. Extended attributes and access control lists for linux. http://acl.betbits.at/.
[9]
{9} IEEE. Portable operating system interface (POSIX)-part 1: System application program interface (API): Protection, audit and control interfaces: C language, October 1997. PSSG/D17, POSIX.1e.
[10]
{10} N. S. A. Information Systems Security Organization. Controlled access protection profile version 1.d, October 1999.
[11]
{11} N. S. A. Information Systems Security Organization. Labeled security protection profile version 1.b, October 1999.
[12]
{12} P.-H. Kemp and R. N. M. Watson. Jails: Confining the omnipotent root. In Proceedings, SANE 2000 Conference. NLUUG, 2000.
[13]
{13} P. A. Loscocco and S. D. Smalley. Integrating Flexible Support for Security Policies into the Linux Operating System. In Proceedings of the USENIX Annual Technical Conference, June 2001.
[14]
{14} M. McKusick, K. Bostic, M. Karels, and J. Quarterman. Design and implementation of the 4.4BSD operating system, 1996.
[15]
{15} A. Morgan. Privileges for linux. http://www.kernel.org/pub /linux/libs/security/linux-privs/.
[16]
{16} U. S. D. of Defense. Trusted Computer System Evaluation Criteria. Department of Defense, December 1985.
[17]
{17} Rule set based access control (RSBAC) for linux. http://www.rsbac.org/.
[18]
{18} SGI. B1 sample source code. http://oss.sgi.com/projects/ob1/.
[19]
{19} Trusted Mach Security Architecture. TIS TMACH Edoc-0001-97A.
[20]
{20} TrustedBSD Project. TrustedBSD home page. http://www.TrustedBSD.org/.
[21]
{21} D. Walsh, B. Lyon, G. Sager, J. M. Chang, D. Goldberg, S. Kleiman, T. Lyon, R. Sandberg, and P. Weiss. Overview of the Sun network file system. In Proceedings: USENIX Association Winter Conference, January 23-25, 1985, Dallas, Texas, USA, pages 117- 124. USENIX, Winter 1985.
[22]
{22} R. Watson. Introducing supporting infrastructure for trusted operating system support in FreeBSD. In BSD Conference , Monterey, CA, USA, October 2000.

Cited By

View all

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
June 2001
297 pages
ISBN:1880446103

Publisher

USENIX Association

United States

Publication History

Published: 25 June 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media