|
Referencias |
- Cristiá,
M., "Verificación formal de una extensión segura de
un sistema de archivos compatible con UNIX", Tesis de
Maestría, Instituto de Computación, Universidad de la
República (Uruguay), 2002.
- Gasser,
M., Building a Secure Computer System, Van Nostrand
Reinhold, New York, 1988.
- Abrams,
M., and H. Podell, and S. Jajodia, Information Security-An
Integrated Collection of Essays, IEEE Computer Society
Press, 1995.
- Loscoco,
P., et. al., "The inevitability of failure: the flawed
assumption of security in modern computer environments",
www.nsa.gov/selinux.
- Schneier,
B., Secrets & Lies: Digital security in a networked
World, Wiley Computer Publishing, 2000.
- Stocks,
P., "Applying formal methods to software testing", Doctoral
Thesis, Department of Computer Science, University of
Queensland, 1993.
- Bell,
D., and L. LaPadula, "Secure Computer Systems: Mathematical
Foundations and Model", Vols. I-II, ESD-TR-73-278, The
MITRE Corporation, Bedford, MA 1973/74.
- Tsai,
C., V.D. Gligor, and C.S. Chandersekaran, "A Formal
Method for the Identification of Covert Storage Channels
in Source Code," Proceedings of the 1987 IEEE Symposium
on Security and Privacy, pp. 4-87, April 1987.
- Gligor,
V.D., and et. al.,. "A New Security Testing Method and
Its Application to the Secure Xenix Kernel", TSE 13(2):
169-183, 1987.
- Smith,
R., "Cost Profile of a Highly Assured, Secure Operating
System", ACM Transactions on Information and System
Security, 4(1), February 2001.
- http://www.trustedbsd.org/
- Amoroso,
E., et. al. "Toward an Approach to Measuring Software
Trust", Proceedings of the IEEE Symposium on Research
in Security and Privacy, Oakland, CA, May 1991.
- Trusted
Computer System Evaluation Criteria, DOD 5200.28-STD,
US Dept. of Defense, december 1985.
- McLean,
J., "The specification and modeling of computer security";
IEEE Computer, january 1990
|
|
|