The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen Smalley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen Smalley
    Which operating system access control technique will provide the greatest overall benefit to users?. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:147-148 [Conf]
  2. Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
    Panel: which access control technique will provide the greatest overall benefit-Abstract. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:141- [Conf]
  3. Peter Loscocco, Stephen Smalley
    Integrating Flexible Support for Security Policies into the Linux Operating System. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2001, pp:29-42 [Conf]
  4. Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman
    Linux Security Modules: General Security Support for the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:17-31 [Conf]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002