Usable Security Project
Western Illinois University
 
 
Welcome to Usable Security Education Project Home Page
  

Section 7: Operating Systems Security - Reading List

  1. Operating Systems Security Considerations
  2. IBM Operating System Security
  3. An Integrated Toolkit For Operating System Security
  4. A Comparison of Commercial and Military Computer Security Policies, David D. Clark, David R. Wilson IEEE Symposium on Security and Privacy, 1987.
  5. An Intrusion Detection Model, Dorothy E. Denning, IEEE Trans on Software Engineering, 1987.
  6. Preventing Privilege Escalation, Niels Provos, Markus Friedl, Peter Honeyman, Proceedings of the 12th conference on USENIX Security Symposium, Vol 12, 2003.
  7. A Look Back at "Security Problems in the TCP/IP Protocol Suite", Steven M. Bellovin, Proceedings of the 20th Annual Computer Security Applications Conference, 2004.
  8. Application Security On Untrusted Operating Systems", Dan R. K. Ports, Tal Garfinkel, HotSec ’08, San Jose, CA, Jul 2008.
  9. Oracle Features and Benefits - Security

Top

 
 
 
 
Usable Security Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.