Analyzing security-enhanced Linux policy specifications | IEEE Conference Publication | IEEE Xplore