메뉴 건너뛰기




Volumn 2, Issue 6, 1998, Pages 35-45

Securing systems against external programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; JAVA PROGRAMMING LANGUAGE; SECURITY SYSTEMS; WORLD WIDE WEB;

EID: 0032204766     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/4236.735985     Document Type: Article
Times cited : (13)

References (11)
  • 1
    • 80054992065 scopus 로고
    • Extensibility, Safety and Performance in the SPIN Operating System
    • ACM Press, New York
    • th ACM Symp. Operating System Principles, No. 15, ACM Press, New York, 1995, pp. 267-284; available at http://www.acm.org/ pubs/articles/proceedings/ops/224056/p267/bershad/p267-bershad.pdf.
    • (1995) th ACM Symp. Operating System Principles , Issue.15 , pp. 267-284
    • Bershad, B.N.1
  • 2
    • 84887507059 scopus 로고    scopus 로고
    • Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Devolopment Kit 1.2
    • USENIX Assoc., Berkeley, Calif.
    • L. Gong et al., "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Devolopment Kit 1.2," Proc. Usenix Symp. Internet Technologies and Systems, USENIX Assoc., Berkeley, Calif., 1997; available to Usenix members at http://www/.usenix.org/publications/ library/proceedings/usits97/gong.html.
    • (1997) Proc. Usenix Symp. Internet Technologies and Systems
    • Gong, L.1
  • 4
    • 0027836576 scopus 로고
    • Efficient Software-based Fault Isolation
    • ACM Press, New York
    • R. Wahbe et al., "Efficient Software-based Fault Isolation," Proc. 14th ACM Symp. Operating Systems Principles, ACM Press, New York, 1993, pp. 203-216; availble at http://www.acm.org/pubs/articles/proceedings/ops/168619/ p203-wahbe/p203-wahbe.pdf.
    • (1993) Proc. 14th ACM Symp. Operating Systems Principles , pp. 203-216
    • Wahbe, R.1
  • 5
    • 0012240184 scopus 로고    scopus 로고
    • Dealing with Disaster: Surviving Misbehaved Kernel Extensions
    • Usenix Assoc., Berkeley, Calif.
    • M.I. Seltzer et al., "Dealing with Disaster: Surviving Misbehaved Kernel Extensions," Second Symp. Operating System Design and Impelementation, Usenix Assoc., Berkeley, Calif., 1996; available at http://www.eecs.harvard.edu/ -vino/vino/osdi-96/.
    • (1996) Second Symp. Operating System Design and Impelementation
    • Seltzer, M.I.1
  • 6
    • 85084097858 scopus 로고    scopus 로고
    • Safe Kernel Extensions without Run-Time Checking
    • Usenix Assoc., Berkeley, Calif.
    • G.C. Necula and P. Lee, "Safe Kernel Extensions without Run-Time Checking," Second Symp. Operating System Design and Implementations, Usenix Assoc., Berkeley, Calif., 1996; available at http://www.usenix.org/publications/ library/proceedings/osdi96/necula.html.
    • (1996) Second Symp. Operating System Design and Implementations
    • Necula, G.C.1    Lee, P.2
  • 7
    • 0013239426 scopus 로고    scopus 로고
    • Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing
    • Univ. of California, Davis
    • R. Pandey and B. Hashii, "Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing," Tech. Report CSE-98-8, Univ. of California, Davis, 1998; available at http://www.cs.ucdavis.edu/∼pandey/ Ariel/Papers/tr9809.ps.
    • (1998) Tech. Report CSE-98-8
    • Pandey, R.1    Hashii, B.2
  • 8
    • 0003613073 scopus 로고    scopus 로고
    • The Safe-Tel Security Model
    • Sun Microsystems Laboratories
    • J.K. Ousterhout, J.Y. Levy, and B.B. Welch, "The Safe-Tel Security Model," Tech. Report TR-97-60, Sun Microsystems Laboratories, 1997; available at http://research.sun. com/technical-reports/1997/abstract-60.html.
    • (1997) Tech. Report TR-97-60
    • Ousterhout, J.K.1    Levy, J.Y.2    Welch, B.B.3
  • 9
    • 84974687699 scopus 로고
    • Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment
    • Jan.
    • C.L. Liu and J.W. Layland, "Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment," J. ACM, Vol. 20, No. 1, Jan. 1973.
    • (1973) J. ACM , vol.20 , Issue.1
    • Liu, C.L.1    Layland, J.W.2
  • 10
    • 85085851337 scopus 로고    scopus 로고
    • CPU Inheritance Scheduling
    • Usenix Assoc., Berkeley, Calif.
    • B. Ford and S. Susarla, "CPU Inheritance Scheduling," Second Symp. Operating Systems Design and Implementation, Usenix Assoc., Berkeley, Calif., 1996; available at http:// www.usenix.org/publications/library/proceedings/osdi96/ ford.html.
    • (1996) Second Symp. Operating Systems Design and Implementation
    • Ford, B.1    Susarla, S.2
  • 11
    • 0031655520 scopus 로고    scopus 로고
    • Market-Based Resource Control for Mobile Agents
    • May ACM Press, New York
    • J. Bredin, D. Kotz, and D. Rus, "Market-Based Resource Control for Mobile Agents," Proc. Autonomous Agents, May 1998, ACM Press, New York, pp. 197-204; available at http://www.acm.org/pubs/articles/proceedings/ai/2807/65/ p197-bredin/p197-bredin.pdf.
    • (1998) Proc. Autonomous Agents , pp. 197-204
    • Bredin, J.1    Kotz, D.2    Rus, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.