RELATED WORK Prior work on the formal analysis of hook placement in the LSM framework has focused on verifying the .... In USENIX Annual Technical, June 2001. [16J J. McLean. The specification and modeling of computer security.
|Title||:||ACM Conference on Computer and Communications Security|
|Author||:||Catherine Meadows, Paul Syverson|