Verifying information flow goals in Security-Enhanced Linux.
Joshua D. GuttmanAmy L. HerzogJohn D. RamsdellClement W. SkorupkaPublished in: J. Comput. Secur. (2005)
Keyphrases
- business processes
- information flow
- information security
- flow analysis
- operating system
- supply chain
- information flows
- communication networks
- functional modules
- social networks
- open source
- process management
- organizational structure
- flow graph
- multi threaded
- multi context systems
- emergency management
- intrusion detection
- anomaly detection
- software engineering
- data sources