Wong, Raymond M., A Comparison of Secure UNIX Operating Systems, Oracle Corporation, Redwood Shores, CA 94065, pp. 322-333, 1990. |
McIlroy, M. D., et al., Multilevel Security in the UNIX Tradition, Software-Practice and Experience, vol. 22(8), Aug. 1992, pp. 673-694. |
Carson, Mark E., AIX Security Services [AIX project, S126], IBM Federal Sector Division, 182/3F43, Gaithersburg, MD 20879, USA, pp. 103-118. No Date. |
Siil, Karl A., Adapting Applications to Multi-Level Secure UNIX Systems, AT&T Bell Laboratories, 1 Whippany Road, Whippany, NJ 07981, USA, Information Security, DT Lindsay and W.L. Price (Eds), Elsevier Science Publishers B.V. (North-Holland), 1991 IFIP, pp. 325-335. |
Thomsen, D. J., et al., A Comparison of Type Enforcement and Unix Setuid Implementation of Well-Formed Transactions, Secure Computing Technology Corporation, Arden Hills, MN 55112, pp. 304-312, 1990. |
Herzog, Holger, et al., Evaluation of Distributed Operating Systems in Open Networks, Siemens AG, Germany, EurOpen '91- Tromse, 20-24 May, pp. 53-67. May 1991. |
Linn, John, Generic Security Service Application Program Interface, Secure Systems, Digital Equipment Corp., Boxborough, MA 01719-1326, USENIX Association, UNIX Security Workshop, pp. 33-53. No Date. |