BOOK-CHAPTER

Information Flow Query and Verification for Security Policy of Security-Enhanced Linux

Yiming ChenYung‐Wei Kao

Year: 2006 Lecture notes in computer science Pages: 389-404   Publisher: Springer Science+Business Media
Keywords:
Computer science Security policy Information flow Computer security model Access control Computer security Operating system Database

Metrics

9
Cited By
1.91
FWCI (Field Weighted Citation Impact)
16
Refs
0.88
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Service-Oriented Architecture and Web Services
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Verifying information flow goals in Security-Enhanced Linux

Joshua D. GuttmanAmy L. HerzogJohn D. RamsdellClement William Skorupka

Journal:   Journal of Computer Security Year: 2005 Vol: 13 (1)Pages: 115-134
JOURNAL ARTICLE

A Security Policy Configuration for the Security-Enhanced Linux

Stephen Smalley

Year: 2002 Vol: 33 (1)Pages: 60-65
JOURNAL ARTICLE

Security Enhanced Linux

Kunz, Oliver

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2014
JOURNAL ARTICLE

Security Enhanced Linux

Kunz, Oliver

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2014
© 2026 ScienceGate Book Chapters — All rights reserved.