-
1
-
-
80054992065
-
Extensibility, Safety and Performance in the SPIN Operating System
-
ACM Press, New York
-
th ACM Symp. Operating System Principles, No. 15, ACM Press, New York, 1995, pp. 267-284; available at http://www.acm.org/ pubs/articles/proceedings/ops/224056/p267/bershad/p267-bershad.pdf.
-
(1995)
th ACM Symp. Operating System Principles
, Issue.15
, pp. 267-284
-
-
Bershad, B.N.1
-
2
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Devolopment Kit 1.2
-
USENIX Assoc., Berkeley, Calif.
-
L. Gong et al., "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Devolopment Kit 1.2," Proc. Usenix Symp. Internet Technologies and Systems, USENIX Assoc., Berkeley, Calif., 1997; available to Usenix members at http://www/.usenix.org/publications/ library/proceedings/usits97/gong.html.
-
(1997)
Proc. Usenix Symp. Internet Technologies and Systems
-
-
Gong, L.1
-
3
-
-
0003680553
-
-
John Wiley & Sons, New York
-
G. McGraw and E.W. Felten, "Java Security: Hostile Applet, Holes, and Antidotes," John Wiley & Sons, New York, 1997.
-
(1997)
Java Security: Hostile Applet, Holes, and Antidotes
-
-
McGraw, G.1
Felten, E.W.2
-
4
-
-
0027836576
-
Efficient Software-based Fault Isolation
-
ACM Press, New York
-
R. Wahbe et al., "Efficient Software-based Fault Isolation," Proc. 14th ACM Symp. Operating Systems Principles, ACM Press, New York, 1993, pp. 203-216; availble at http://www.acm.org/pubs/articles/proceedings/ops/168619/ p203-wahbe/p203-wahbe.pdf.
-
(1993)
Proc. 14th ACM Symp. Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
-
5
-
-
0012240184
-
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
-
Usenix Assoc., Berkeley, Calif.
-
M.I. Seltzer et al., "Dealing with Disaster: Surviving Misbehaved Kernel Extensions," Second Symp. Operating System Design and Impelementation, Usenix Assoc., Berkeley, Calif., 1996; available at http://www.eecs.harvard.edu/ -vino/vino/osdi-96/.
-
(1996)
Second Symp. Operating System Design and Impelementation
-
-
Seltzer, M.I.1
-
6
-
-
85084097858
-
Safe Kernel Extensions without Run-Time Checking
-
Usenix Assoc., Berkeley, Calif.
-
G.C. Necula and P. Lee, "Safe Kernel Extensions without Run-Time Checking," Second Symp. Operating System Design and Implementations, Usenix Assoc., Berkeley, Calif., 1996; available at http://www.usenix.org/publications/ library/proceedings/osdi96/necula.html.
-
(1996)
Second Symp. Operating System Design and Implementations
-
-
Necula, G.C.1
Lee, P.2
-
7
-
-
0013239426
-
Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing
-
Univ. of California, Davis
-
R. Pandey and B. Hashii, "Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing," Tech. Report CSE-98-8, Univ. of California, Davis, 1998; available at http://www.cs.ucdavis.edu/∼pandey/ Ariel/Papers/tr9809.ps.
-
(1998)
Tech. Report CSE-98-8
-
-
Pandey, R.1
Hashii, B.2
-
8
-
-
0003613073
-
The Safe-Tel Security Model
-
Sun Microsystems Laboratories
-
J.K. Ousterhout, J.Y. Levy, and B.B. Welch, "The Safe-Tel Security Model," Tech. Report TR-97-60, Sun Microsystems Laboratories, 1997; available at http://research.sun. com/technical-reports/1997/abstract-60.html.
-
(1997)
Tech. Report TR-97-60
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
9
-
-
84974687699
-
Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment
-
Jan.
-
C.L. Liu and J.W. Layland, "Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment," J. ACM, Vol. 20, No. 1, Jan. 1973.
-
(1973)
J. ACM
, vol.20
, Issue.1
-
-
Liu, C.L.1
Layland, J.W.2
-
10
-
-
85085851337
-
CPU Inheritance Scheduling
-
Usenix Assoc., Berkeley, Calif.
-
B. Ford and S. Susarla, "CPU Inheritance Scheduling," Second Symp. Operating Systems Design and Implementation, Usenix Assoc., Berkeley, Calif., 1996; available at http:// www.usenix.org/publications/library/proceedings/osdi96/ ford.html.
-
(1996)
Second Symp. Operating Systems Design and Implementation
-
-
Ford, B.1
Susarla, S.2
-
11
-
-
0031655520
-
Market-Based Resource Control for Mobile Agents
-
May ACM Press, New York
-
J. Bredin, D. Kotz, and D. Rus, "Market-Based Resource Control for Mobile Agents," Proc. Autonomous Agents, May 1998, ACM Press, New York, pp. 197-204; available at http://www.acm.org/pubs/articles/proceedings/ai/2807/65/ p197-bredin/p197-bredin.pdf.
-
(1998)
Proc. Autonomous Agents
, pp. 197-204
-
-
Bredin, J.1
Kotz, D.2
Rus, D.3
|