-
1
-
-
0026140567
-
The interaction of architecture and operating system design
-
ANDERSON, T. E., LEVY, H. M., BERSHAD, B. N., AND LAZOWSKA, E. D. The interaction of architecture and operating system design. In Proceedings of the Fourth ACM Symposium on Architectural Support for Programming Languages and Operating Systems (1991).
-
(1991)
Proceedings of the Fourth ACM Symposium on Architectural Support for Programming Languages and Operating Systems
-
-
Anderson, T.E.1
Levy, H.M.2
Bershad, B.N.3
Lazowska, E.D.4
-
2
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
BADGER, L., STERNE, D. F., SHERMAN, D. L., WALKER, K. M., AND HAGHIGHAT, S. A. Practical domain and type enforcement for UNIX. In Proceedings of the 1995 IEEE Symposium on Security and Privacy (1995), pp. 66-77.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
80054992065
-
Extensibility, safety, and performance in the SPIN operating system
-
Dec.
-
BERSHAD, B. N., SAVAGE, S., PARDYAK, P., SIRER, E. G., FIUCZYNSKI, M., BECKER, D., EGGERS, S., AND CHAMBERS, C. Extensibility, safety, and performance in the SPIN operating system. In Proceedings of 15th ACM Symposium on Operating Systems Principles (Dec. 1995), pp. 251-266.
-
(1995)
Proceedings of 15th ACM Symposium on Operating Systems Principles
, pp. 251-266
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.5
Becker, D.6
Eggers, S.7
Chambers, C.8
-
4
-
-
0345968312
-
System/38 addressing and authorization
-
IBM, July
-
BERSTIS, V., TRUXAL, C. D., AND RANWEILER, J. G. System/38 addressing and authorization. In IBM System/38 Technical Developments, 2nd ed. IBM, July 1980, pp. 51-54.
-
(1980)
IBM System/38 Technical Developments, 2nd Ed.
, pp. 51-54
-
-
Berstis, V.1
Truxal, C.D.2
Ranweiler, J.G.3
-
5
-
-
0027808828
-
Network objects
-
Dec.
-
BIRRELL, A., NELSON, G., OWICKI, S., AND WOBBER, E. Network objects. In Proceedings of 13th ACM Symposium on Operating Systems Principles (Dec. 1993), pp. 217-230.
-
(1993)
Proceedings of 13th ACM Symposium on Operating Systems Principles
, pp. 217-230
-
-
Birrell, A.1
Nelson, G.2
Owicki, S.3
Wobber, E.4
-
8
-
-
0029697575
-
Java security: From HotJava to Netscape and beyond
-
Oakland, CA, May
-
DEAN, D., FELTEN, E. W., AND WALLACH, D. S. Java security: From HotJava to Netscape and beyond. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (Oakland, CA, May 1996), pp. 190-200.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
-
11
-
-
0016081585
-
Capability-based addressing
-
July
-
FABRY, R. S. Capability-based addressing. Communications of the ACM 17, 7 (July 1974), 403-411.
-
(1974)
Communications of the ACM 17
, vol.7
, pp. 403-411
-
-
Fabry, R.S.1
-
13
-
-
0004249393
-
-
Mar.
-
FREIER, A. O., KARLTON, P., AND KOCHER, P. C. The SSL Protocol: Version 3.0, Mar. 1996. Internet draft, ftp:// ietf.cnri.reston.va.us/internet-drafts/ draft-freier-ssl-version3-01.txt.
-
(1996)
The SSL Protocol: Version 3.0
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
16
-
-
0030674187
-
New security architectural directions for Java
-
Feb.
-
GONG, L. New security architectural directions for Java. In Proceedings of IEEE COMPCON '97 (Feb. 1997).
-
(1997)
Proceedings of IEEE COMPCON '97
-
-
Gong, L.1
-
17
-
-
0345968311
-
-
personal communication
-
GONG, L. personal communication, 1997.
-
(1997)
-
-
Gong, L.1
-
20
-
-
0343420427
-
-
O'Reilly & Associates, Inc., July
-
Hu, W. DCE Security Programming. O'Reilly & Associates, Inc., July 1995.
-
(1995)
DCE Security Programming
-
-
Hu, W.1
-
21
-
-
85084161058
-
Building systems that flexibly control downloaded executable content
-
San Jose, CA, July
-
JAEGER, T., RUBIN, A. D., AND PRAKASH, A. Building systems that flexibly control downloaded executable content. In Sixth USENIX Security Symposium Proceedings (San Jose, CA, July 1996), pp. 131-148.
-
(1996)
Sixth USENIX Security Symposium Proceedings
, pp. 131-148
-
-
Jaeger, T.1
Rubin, A.D.2
Prakash, A.3
-
24
-
-
0021197579
-
An augmented capability architecture to support lattice security and traceability of access
-
Oakland, CA, May
-
KARGER, P. A., AND HERBERT, A. J. An augmented capability architecture to support lattice security and traceability of access. In Proceedings of the 1984 IEEE Symposium on Security and Privacy (Oakland, CA, May 1984), pp. 2-12.
-
(1984)
Proceedings of the 1984 IEEE Symposium on Security and Privacy
, pp. 2-12
-
-
Karger, P.A.1
Herbert, A.J.2
-
26
-
-
0002179618
-
-
Reprinted Jan.
-
LAMPSON, B. W. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems (Princeton University, Mar. 1971), pp. 437-443. Reprinted in Operating Systems Review, 8(1): 18-24, Jan. 1974.
-
(1974)
Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
27
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
LAMPSON, B. W. A note on the confinement problem. Communications of the ACM 16, 10 (Oct. 1973), 613-615.
-
(1973)
Communications of the ACM 16
, vol.10
, pp. 613-615
-
-
Lampson, B.W.1
-
30
-
-
0003680553
-
-
John Wiley and Sons
-
MCGRAW, G., AND FELTEN, E. W. Java Security: Hostile Applets, Holes, and Antidotes. John Wiley and Sons, 1996.
-
(1996)
Java Security: Hostile Applets, Holes, and Antidotes
-
-
McGraw, G.1
Felten, E.W.2
-
32
-
-
0041006416
-
-
MIT Press, Cambridge, MA
-
MILNER, R., AND TOFTE, M. Commentary on Standard ML. MIT Press, Cambridge, MA, 1991.
-
(1991)
Commentary on Standard ML
-
-
Milner, R.1
Tofte, M.2
-
34
-
-
85084097858
-
Safe kernel extensions without run-time checking
-
Seattle, WA, Oct.
-
NECULA, G. C., AND LEE, P. Safe kernel extensions without run-time checking. In Proceedings of the Second Symposium on Operating Systems Design and Implementation (OSDI '96) (Seattle, WA, Oct. 1996), pp. 229-243.
-
(1996)
Proceedings of the Second Symposium on Operating Systems Design and Implementation (OSDI '96)
, pp. 229-243
-
-
Necula, G.C.1
Lee, P.2
-
35
-
-
0347229432
-
A provably secure operating system: The system, its applications, and proofs
-
SRI International, May
-
NEUMANN, P. G., BOYER, R. S., FEIERTAG, R. J., LEVITT, K. N., AND ROBINSON, L. A provably secure operating system: The system, its applications, and proofs. Tech. Rep. CSL-116, 2nd Ed., SRI International, May 1980.
-
(1980)
Tech. Rep. CSL-116, 2nd Ed.
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
36
-
-
0347229437
-
-
July OMG Document Number: orbos/96-06-20
-
OBJECT MANAGEMENT GROUP. Common Secure Interoperability, July 1996. OMG Document Number: orbos/96-06-20.
-
(1996)
Common Secure Interoperability
-
-
-
37
-
-
0002532551
-
Why aren't operating systems getting faster as fast as hardware?
-
June
-
OUSTERHOUT, J. K. Why aren't operating systems getting faster as fast as hardware? In Proceedings of Summer 1990 USENIX Conference (June 1990), pp. 247-256.
-
(1990)
Proceedings of Summer 1990 USENIX Conference
, pp. 247-256
-
-
Ousterhout, J.K.1
-
38
-
-
0041984057
-
Plan 9 from Bell Labs
-
London, July
-
PIKE, R., PRESOTTO, D., THOMPSON, K., AND TRICKEY, H. Plan 9 from Bell Labs. In Proceedings of the Summer 1990 UKUUG Conference (London, July 1990), pp. 1-9.
-
(1990)
Proceedings of the Summer 1990 UKUUG Conference
, pp. 1-9
-
-
Pike, R.1
Presotto, D.2
Thompson, K.3
Trickey, H.4
-
39
-
-
0005307289
-
A security kernel based on the lambda-calculus
-
Massachusetts Institute of Technology, Artificial Intelligence Laboratory, Mar.
-
REES, J. A. A security kernel based on the lambda-calculus. Tech. Rep. A.I. Memo No. 1564, Massachusetts Institute of Technology, Artificial Intelligence Laboratory, Mar. 1996.
-
(1996)
Tech. Rep. A.I. Memo No. 1564
-
-
Rees, J.A.1
-
40
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept. 1975), 1278-1308.
-
(1975)
Proceedings of the IEEE 63
, vol.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
42
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
Mar.
-
SCHROEDER, M. D., AND SALTZER, J. H. A hardware architecture for implementing protection rings. Communications of the ACM 15, 3 (Mar. 1972), 157-170.
-
(1972)
Communications of the ACM 15
, vol.3
, pp. 157-170
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
43
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
Oct.
-
SELTZER, M. I., ENDO, Y., SMALL, C., AND SMITH, K. A. Dealing with disaster: Surviving misbehaved kernel extensions. In Proceedings of the Second Symposium on Operating Systems Design and Implementation (OSDI '96) (Oct. 1996), pp. 213-227.
-
(1996)
Proceedings of the Second Symposium on Operating Systems Design and Implementation (OSDI '96)
, pp. 213-227
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
45
-
-
0022561959
-
Using sparse capabilities in a distributed operating system
-
Cambridge, MA, May
-
TANENBAUM, A. S., MULLENDER, S. J., AND VAN RENESSE, R. Using sparse capabilities in a distributed operating system. In 6th International Conference on Distributed Computing Systems (Cambridge, MA, May 1986), pp. 558-563.
-
(1986)
6th International Conference on Distributed Computing Systems
, pp. 558-563
-
-
Tanenbaum, A.S.1
Mullender, S.J.2
Van Renesse, R.3
-
46
-
-
0029697576
-
Secure network objects
-
Oakland, CA, May
-
VAN DOORN, L., ABADI, M., BURROWS, M., AND WOBBER, E. Secure network objects. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (Oakland, CA, May 1996).
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
-
-
Van Doorn, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
47
-
-
85105238769
-
Efficient software-based fault isolation
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. Efficient software-based fault isolation. In Proceedings of the Fourteenth Symposium on Operating System Principles (1993).
-
(1993)
Proceedings of the Fourteenth Symposium on Operating System Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.4
-
48
-
-
0028380781
-
Authentication in the Taos operating system
-
Feb.
-
WOBBER, E., ABADI, M., BURROWS, M., AND LAMPSON, B. Authentication in the Taos operating system. ACM Transactions on Computer Systems 12, 1 (Feb. 1994), 3-32.
-
(1994)
ACM Transactions on Computer Systems 12
, vol.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|