-
1
-
-
0041358637
-
DTE firewalls - Initial measurement and evaluation report
-
Trusted Information Systems, Inc., Glenwood, MD
-
BADGER, L., OOSTENDORP, K. A., MORRISON, W. G., WALKER, K. M., VANCE, C. D., SHERMAN, D. L., AND STERNE, D. F. 1997. DTE firewalls - initial measurement and evaluation report. Tech. Rep. 0632R. Trusted Information Systems, Inc., Glenwood, MD.
-
(1997)
Tech. Rep. 0632R
-
-
Badger, L.1
Oostendorp, K.A.2
Morrison, W.G.3
Walker, K.M.4
Vance, C.D.5
Sherman, D.L.6
Sterne, D.F.7
-
2
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
(Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
BADGER, L., STERNE, D. F., SHERMAN, D. L., WALKER, K. M., AND HAGHIGHAT, S. A. 1995a. Practical domain and type enforcement for UNIX. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 66-77.
-
(1995)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
(Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA
-
BADGER, L., STERNE, D. F., SHERMAN, D. L., WALKER, K. M., AND HAGHIGHAT, S. A. 1995b. A domain and type enforcement UNIX prototype. In Proceedings of the 5th USENIX UNIX Security Symposium (Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA, 127-140.
-
(1995)
Proceedings of the 5th USENIX UNIX Security Symposium
, pp. 127-140
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
(Mar.). MITRE Corp., Bedford, MA. Also ADA023588, National Technical Information Service
-
BELL, D. E. AND LAPADULA, L. J. 1976. Secure computer systems: Unified exposition and Multics interpretation. Tech Rep. MTR-2997 Rev. 1 (Mar.). MITRE Corp., Bedford, MA. Also ADA023588, National Technical Information Service.
-
(1976)
Tech Rep. MTR-2997 Rev. 1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
5
-
-
80054992065
-
Extensibility, safety, and performance in the SPIN operating system
-
(Copper Mountain Resort, CO, Dec.). ACM Press, New York, NY
-
BERSHAD, B., SAVAGE, S., PARDYAK, P., SIRER, E., FIUCZYNSKI, M., BECKER, D., CHAMBERS, C., AND EGGERS, S. 1995. Extensibility, safety, and performance in the SPIN operating system. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain Resort, CO, Dec.). ACM Press, New York, NY, 267-284.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
, pp. 267-284
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.4
Fiuczynski, M.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
(Apr.). MITRE Corp., Bedford, MA. Also ADA039324, National Information Service
-
BIBA, K. J. 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153 Rev. 1 (Apr.). MITRE Corp., Bedford, MA. Also ADA039324, National Information Service.
-
(1977)
Tech. Rep. MTR-3153 Rev. 1
-
-
Biba, K.J.1
-
7
-
-
84982899264
-
The role of trust management in distributed systems security
-
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Springer-Verlag, New York, NY
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, NY, 185-210.
-
(1999)
Lecture Notes in Computer Science
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
9
-
-
0024663219
-
The Chinese wall security policy
-
(Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA
-
BREWER, D. F. C. AND NASH, M. J. 1989. The Chinese Wall security policy. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA, 206-214.
-
(1989)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
10
-
-
84976797486
-
Sharing and protection in a single-address-space operating system
-
Nov.
-
CHASE, J. S., LEVY, H. M., FEELEY, M. J., AND LAZOWSKA, E. D. 1994. Sharing and protection in a single-address-space operating system. ACM Trans. Comput. Syst. 12, 4 (Nov.), 271-307.
-
(1994)
ACM Trans. Comput. Syst.
, vol.12
, Issue.4
, pp. 271-307
-
-
Chase, J.S.1
Levy, H.M.2
Feeley, M.J.3
Lazowska, E.D.4
-
11
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
(Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
-
CLARK, D. AND WILSON, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
12
-
-
84976795329
-
Protection in the Hydra operating system
-
Austin, TX, Nov.
-
COHEN, E., JEFFERSON, D., AND JEFFERSON, D. 1975. Protection in the Hydra operating system. In Proceedings of the 5th ACM Symposium on Operating Systems Principles (Austin, TX, Nov.). 141-160.
-
(1975)
Proceedings of the 5th ACM Symposium on Operating Systems Principles
, pp. 141-160
-
-
Cohen, E.1
Jefferson, D.2
Jefferson, D.3
-
13
-
-
85084161092
-
Automatic program transformation with JOIE
-
(New Orleans, LA, June). USENIX Assoc., Berkeley, CA
-
COHEN, G., CHASE, J., AND KAMINSKY, D. 1998. Automatic program transformation with JOIE. In Proceedings of the 1998 USENIX Annual Technical Conference (New Orleans, LA, June). USENIX Assoc., Berkeley, CA, 167-178.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 167-178
-
-
Cohen, G.1
Chase, J.2
Kaminsky, D.3
-
14
-
-
0012025944
-
-
Sun Microsystems, Inc., Mountain View, CA
-
DAVIDSON, J. D. AND COWARD, D. 1999. Java servlet specification, v2.2. Sun Microsystems, Inc., Mountain View, CA.
-
(1999)
Java Servlet Specification, V2.2
-
-
Davidson, J.D.1
Coward, D.2
-
15
-
-
0029697575
-
Java security: From HotJava to Netscape and beyond
-
(Oakland, CA, May). IEEE Press, Piscataway, NJ
-
DEAN, D., FELTEN, E., AND WALLACH, D. 1996. Java security: From HotJava to Netscape and beyond. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ, 190-200.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Dean, D.1
Felten, E.2
Wallach, D.3
-
16
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2 (May), 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.2
, pp. 236-243
-
-
Denning, D.E.1
-
18
-
-
0003593599
-
-
RFC 2693. Internet Engineering Task Force
-
ELLISON, C. M., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. SPKI certificate theory. RFC 2693. Internet Engineering Task Force.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
19
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
(Caledon Hills, Ontario, Canada, Sept.). ACM Press, New York, NY
-
ERLINGSSON, Ú. AND SCHNEIDER, F. B. 1999. SASI enforcement of security policies: A retrospective. In Proceedings of the 1999 ACM Workshop on New Security Paradigms (Caledon Hills, Ontario, Canada, Sept.). ACM Press, New York, NY, 87-95.
-
(1999)
Proceedings of the 1999 ACM Workshop on New Security Paradigms
, pp. 87-95
-
-
Erlingsson, Ú.1
Schneider, F.B.2
-
22
-
-
0002357382
-
Role based access control
-
National Institute of Standards and Technology, Gaithersburg, MD
-
FERRAIOLO, D. AND KUHN, D. R. 1992. Role based access control. In Proceedings of the 15th Annual Conference on National Computer Security. National Institute of Standards and Technology, Gaithersburg, MD, 554-563.
-
(1992)
Proceedings of the 15th Annual Conference on National Computer Security
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, D.R.2
-
23
-
-
0002262722
-
Role based access control (RBAC): Features and motivations
-
(New Orleans, LA, Dec.). IEEE Computer Society Press, Los Alamitos, CA
-
FERRAIOLO, D., CUGINI, J., AND KUHN, D. R. 1995. Role based access control (RBAC): Features and motivations. In Proceedings of the 11th Annual Conference on Computer Security Applications (New Orleans, LA, Dec.). IEEE Computer Society Press, Los Alamitos, CA, 241-248.
-
(1995)
Proceedings of the 11th Annual Conference on Computer Security Applications
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, D.R.3
-
24
-
-
85084163611
-
SLIC: An extensibility system for commodity operating systems
-
(New Orleans, LA, June). USENIX Assoc., Berkeley, CA
-
GHORMLEY, D. P., PETROU, D., ANDERSON, T. E., AND RODRIGUES, S. H. 1998. SLIC: An extensibility system for commodity operating systems. In Proceedings of the 1998 USENIX Annual Technical Conference (New Orleans, LA, June). USENIX Assoc., Berkeley, CA, 39-52.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Anderson, T.E.3
Rodrigues, S.H.4
-
25
-
-
0003313661
-
Java security: Present and near future
-
May/June
-
GONG, L. 1997. Java security: Present and near future. IEEE Micro 17, 3 (May/June), 14-19.
-
(1997)
IEEE Micro
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
26
-
-
0003801299
-
-
Addison-Wesley, Reading, MA
-
GONG, L. 1999. Inside Java Platform Security - Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA.
-
(1999)
Inside Java Platform Security - Architecture, API Design, and Implementation
-
-
Gong, L.1
-
28
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
(Monterey, CA, Dec.). USENIX Assoc., Berkeley, CA
-
GONG, L., MUELLER, M., AND PRAFULLCHANDRA, H. 1997. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (Monterey, CA, Dec.). USENIX Assoc., Berkeley, CA, 103-112.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
-
29
-
-
0003518498
-
-
Addison-Wesley, Reading, MA
-
GOSLING, J., JOY, B., AND STEELE, G. 1996. The Java Language Specification. Addison-Wesley, Reading, MA.
-
(1996)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
30
-
-
85084161113
-
Adaptable binary programs
-
(New Orleans, LA, Jan.). USENIX Assoc., Berkeley, CA
-
GRAHAM, S. L., LUCCO, S., AND WAHBE, R. 1995. Adaptable binary programs. In Proceedings of the 1995 USENIX Annual Technical Conference (New Orleans, LA, Jan.). USENIX Assoc., Berkeley, CA, 315-325.
-
(1995)
Proceedings of the 1995 USENIX Annual Technical Conference
, pp. 315-325
-
-
Graham, S.L.1
Lucco, S.2
Wahbe, R.3
-
31
-
-
0030721196
-
A protection scheme for mobile agents on Java
-
(MOBICOM '97, Budapest, Hungary, Sept. 26-30), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Chairs. ACM Press, New York, NY
-
HAGIMONT, D. AND ISMAIL, L. 1997. A protection scheme for mobile agents on Java. In Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '97, Budapest, Hungary, Sept. 26-30), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Chairs. ACM Press, New York, NY, 215-222.
-
(1997)
Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 215-222
-
-
Hagimont, D.I.L.1
-
32
-
-
0024089972
-
The confused deputy
-
Oct.
-
HARDY, N. 1988. The confused deputy. ACM SIGOPS Oper. Syst. Rev. 22, 4 (Oct.), 36-38. http://www.cis.upenn.edu/ KeyKOS/ConfusedDeputy.html
-
(1988)
ACM SIGOPS Oper. Syst. Rev.
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
33
-
-
0347898492
-
Language support for extensible operating systems
-
Tucson, AZ, Feb.
-
HSIEH, W. C., FIUCZYNSKI, M. E., GARRETT, C., SAVAGE, S., BECKER, D., AND BERSHAD, B. N. 1996. Language support for extensible operating systems. In Proceedings of the ACM Workshop on Compiler Support for System Software (Tucson, AZ, Feb.). 127-133.
-
(1996)
Proceedings of the ACM Workshop on Compiler Support for System Software
, pp. 127-133
-
-
Hsieh, W.C.1
Fiuczynski, M.E.2
Garrett, C.3
Savage, S.4
Becker, D.5
Bershad, B.N.6
-
34
-
-
84875947153
-
Detours: Binary interception of win32 functions
-
(Seattle, WA, July). USENIX Assoc., Berkeley, CA
-
HUNT, G. AND BRUBACHER, D. 1999. Detours: Binary interception of Win32 functions. In Proceedings of the 3rd USENIX Windows NT Symposium (Seattle, WA, July). USENIX Assoc., Berkeley, CA, 135-143.
-
(1999)
Proceedings of the 3rd USENIX Windows NT Symposium
, pp. 135-143
-
-
Hunt, G.1
Brubacher, D.2
-
35
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
(Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY
-
JONES, M. B. 1993. Interposition agents: Transparently interposing user code at the system interface. In Proceedings of the 14th ACM Symposium on Operating Systems Principles (Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY, 80-83.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
, pp. 80-83
-
-
Jones, M.B.1
-
36
-
-
0041358635
-
COLA: Customized overlaying
-
(San Francisco, CA, Jan.). USENIX Assoc., Berkeley, CA
-
KRELL, E. AND KRISHNAMURTHY, B. 1992. COLA: Customized overlaying. In Proceedings of the 1992 Winter USENIX Conference (San Francisco, CA, Jan.). USENIX Assoc., Berkeley, CA, 3-7.
-
(1992)
Proceedings of the 1992 Winter USENIX Conference
, pp. 3-7
-
-
Krell, E.1
Krishnamurthy, B.2
-
39
-
-
0023859517
-
Using mandatory integrity to enforce "commercial" security
-
Oakland, CA, Apr.
-
LEE, T. 1988. Using mandatory integrity to enforce "commercial" security. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, Apr.). 140-146.
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 140-146
-
-
Lee, T.1
-
41
-
-
0020253786
-
Non-discretionary controls for commercial applications
-
(Oakland, CA, Apr.). IEEE Computer Society Press, Los Alamitos, CA
-
LIPNER, S. B. 1982. Non-discretionary controls for commercial applications. In Proceedings of the 1982 IEEE Computer Society Symposium on Research in Security and Privacy (Oakland, CA, Apr.). IEEE Computer Society Press, Los Alamitos, CA, 2-10.
-
(1982)
Proceedings of the 1982 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 2-10
-
-
Lipner, S.B.1
-
42
-
-
0025022888
-
Beyond the pale of MAC and DAC - Defining new forms of access control
-
(Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
-
MCCOLLUM, C. J., MESSING, J. R., AND NOTARGIACOMO, L. 1990. Beyond the pale of MAC and DAC - Defining new forms of access control. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 190-200.
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
43
-
-
0003680553
-
-
John Wiley and Sons, Inc., New York, NY
-
MCGRAW, G. AND FELTEN, E. W. 1996. Java Security: Hostile Applets, Holes, and Antidotes. John Wiley and Sons, Inc., New York, NY.
-
(1996)
Java Security: Hostile Applets, Holes, and Antidotes
-
-
McGraw, G.1
Felten, E.W.2
-
44
-
-
0003972113
-
-
Addison-Wesley UNIX and open systems series. Addison-Wesley Publishing Co., Inc., Redwood City, CA
-
MCKUSICK, M. K., BOSTIC, K., KARELS, M. J., AND QUARTERMAN, J. S. 1996. The Design and Implementation of the 4.4BSD Operating System. Addison-Wesley UNIX and open systems series. Addison-Wesley Publishing Co., Inc., Redwood City, CA.
-
(1996)
The Design and Implementation of the 4.4BSD Operating System
-
-
McKusick, M.K.1
Bostic, K.2
Karels, M.J.3
Quarterman, J.S.4
-
45
-
-
85084163247
-
Providing policy control over object operations in a mach-based system
-
(Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA
-
MINEAR, S. E. 1995. Providing policy control over object operations in a Mach-based system. In Proceedings of the 5th USENIX UNIX Security Symposium (Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA, 141-156.
-
(1995)
Proceedings of the 5th USENIX UNIX Security Symposium
, pp. 141-156
-
-
Minear, S.E.1
-
46
-
-
0031679751
-
From system F to typed assembly language
-
(POPL '98, San Diego, CA, Jan. 19-21), D. B. MacQueen and L. Cardelli, Chairs. ACM Press, New York, NY
-
MORRISETT, G., WALKER, D., CRARY, K., AND GLEW, N. 1998. From System F to typed assembly language. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '98, San Diego, CA, Jan. 19-21), D. B. MacQueen and L. Cardelli, Chairs. ACM Press, New York, NY, 85-97.
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 85-97
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
47
-
-
0031543270
-
A decentralized model for information flow control
-
(SOSP '97, Saint-Malo, France, Oct. 5-8), W. M. Waite, Ed. ACM Press, New York, NY
-
MYERS, A. C. AND LISKOV, B. 1997. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97, Saint-Malo, France, Oct. 5-8), W. M. Waite, Ed. ACM Press, New York, NY, 129-142.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
49
-
-
0003975281
-
-
Prentice-Hall series in innovative technology. Prentice-Hall, Inc., Upper Saddle River, NJ
-
NELSON, G., ED. 1991. Systems Programming With Modula-3. Prentice-Hall series in innovative technology. Prentice-Hall, Inc., Upper Saddle River, NJ.
-
(1991)
Systems Programming with Modula-3
-
-
Nelson, G.1
-
50
-
-
0013255393
-
Developing and using a "policy neutral" access control policy
-
(Lake Arrowhead, CA, Sept.). ACM, New York, NY
-
OLAWSKY, D., FINE, T., SCHNEIDER, E., AND SPENCER, R. 1996. Developing and using a "policy neutral" access control policy. In Proceedings of the 1996 ACM Workshop on New Security Paradigms (Lake Arrowhead, CA, Sept.). ACM, New York, NY, 60-67.
-
(1996)
Proceedings of the 1996 ACM Workshop on New Security Paradigms
, pp. 60-67
-
-
Olawsky, D.1
Fine, T.2
Schneider, E.3
Spencer, R.4
-
51
-
-
84947907563
-
Providing fine-grained access control for Java programs
-
(Lisbon, Portugal, June). Springer-Verlag, New York, NY
-
PANDEY, R. AND HASHII, B. 1999. Providing fine-grained access control for Java programs. In Proceedings of the 13th European Conference on Object-Oriented Programming (Lisbon, Portugal, June). Springer-Verlag, New York, NY, 449-494.
-
(1999)
Proceedings of the 13th European Conference on Object-oriented Programming
, pp. 449-494
-
-
Pandey, R.1
Hashii, B.2
-
52
-
-
85085853286
-
Dynamic binding for an extensible system
-
(OSDI '96, Seattle, WA, Oct. 28-31), K. Petersen and W. Zwaenepoel, Chairs. ACM Press, New York, NY
-
PARDYAK, P. AND BERSHAD, B. N. 1996. Dynamic binding for an extensible system. In Proceedings of the 2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI '96, Seattle, WA, Oct. 28-31), K. Petersen and W. Zwaenepoel, Chairs. ACM Press, New York, NY, 201-212.
-
(1996)
Proceedings of the 2nd USENIX Symposium on Operating Systems Design and Implementation
, pp. 201-212
-
-
Pardyak, P.1
Bershad, B.N.2
-
53
-
-
0026977869
-
CACL: Efficient fine-grained protection for objects
-
(OOPSLA '92, Vancouver, British Columbia, Canada, Oct. 18-22), J. Pugh, Chair. ACM Press, New York, NY
-
RICHARDSON, J., SCHWARZ, P., AND CABRERA, L. -F. 1992. CACL: Efficient fine-grained protection for objects. In Proceedings of the ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA '92, Vancouver, British Columbia, Canada, Oct. 18-22), J. Pugh, Chair. ACM Press, New York, NY, 263-275.
-
(1992)
Proceedings of the ACM Conference on Object-oriented Programming Systems, Languages, and Applications
, pp. 263-275
-
-
Richardson, J.1
Schwarz, P.2
Cabrera, L.-F.3
-
54
-
-
0012692275
-
Microsoft .NET framework delivers the platform for an integrated, service-oriented web
-
Oct.
-
RICHTER, J. 2000. Microsoft .NET framework delivers the platform for an integrated, service-oriented web. MSDN Mag. 15, 10 (Oct.), 56-65.
-
(2000)
MSDN Mag.
, vol.15
, Issue.10
, pp. 56-65
-
-
Richter, J.1
-
55
-
-
19944382870
-
Instrumentation and optimization of win32/intel executables using etch
-
(Seattle, WA, Aug.). USENIX Assoc., Berkeley, CA
-
ROMER, T., VOELKER, G., LEE, D., WOMAN, A., WONG, W., LEVY, H., BERSHAD, B. N., AND CHEN, B. 1997. Instrumentation and optimization of Win32/Intel executables using Etch. In Proceedings of the USENIX Windows NT Workshop (Seattle, WA, Aug.). USENIX Assoc., Berkeley, CA, 1-8.
-
(1997)
Proceedings of the USENIX Windows NT Workshop
, pp. 1-8
-
-
Romer, T.1
Voelker, G.2
Lee, D.3
Woman, A.4
Wong, W.5
Levy, H.6
Bershad, B.N.7
Chen, B.8
-
56
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.), 1278-1308.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
57
-
-
0030086382
-
Role-based access control models
-
Feb.
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
58
-
-
84881225236
-
Enforceable security policies
-
Feb.
-
SCHNEIDER, F. B. 2000. Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3, 1 (Feb.), 30-50.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
59
-
-
0042484465
-
-
Tech. Rep. DTOS CDRL A008. Secure Computing Corporation, Roseville, MN
-
SECURE COMPUTING CORPORATION. 1997a. DTOS lessons learned report. Tech. Rep. DTOS CDRL A008. Secure Computing Corporation, Roseville, MN.
-
(1997)
DTOS Lessons Learned Report
-
-
-
60
-
-
0041859446
-
-
Tech. Rep. DTOS CDRL A011. Secure Computing Corporation, Roseville, MN
-
SECURE COMPUTING CORPORATION. 1997b. DTOS general system security and assurability assessment report. Tech. Rep. DTOS CDRL A011. Secure Computing Corporation, Roseville, MN.
-
(1997)
DTOS General System Security and Assurability Assessment Report
-
-
-
61
-
-
33745413221
-
Safe dynamic linking in an extensible operating system
-
Tucson, AZ, Feb.
-
SIRER, E. G., FIUCZYNSKI, M., PARDYAK, P., AND BERSHAD, B. N. 1996a. Safe dynamic linking in an extensible operating system. In Proceedings of the ACM Workshop on Compiler Support for System Software (Tucson, AZ, Feb.). 134-140.
-
(1996)
Proceedings of the ACM Workshop on Compiler Support for System Software
, pp. 134-140
-
-
Sirer, E.G.1
Fiuczynski, M.2
Pardyak, P.3
Bershad, B.N.4
-
62
-
-
0041350423
-
Design and implementation of a distributed virtual machine for networked computers
-
(Kiawah Island Resort, SC, Dec.). ACM Press, New York, NY
-
SIRER, E. G., GRIMM, R., GREGORY, A. J., AND BERSHAD, B. N. 1999. Design and implementation of a distributed virtual machine for networked computers. In Proceedings of the 17th ACM Symposium on Operating System Principles (Kiawah Island Resort, SC, Dec.). ACM Press, New York, NY, 202-216.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating System Principles
, pp. 202-216
-
-
Sirer, E.G.1
Grimm, R.2
Gregory, A.J.3
Bershad, B.N.4
-
63
-
-
0041358634
-
Writing an operating system with modula-3
-
Tucson, AZ, Feb.
-
SIRER, E. G., SAVAGE, S., PARDYAK, P., DEFOUW, G. P., ALAPAT, M. A., AND BERSHAD, B. N. 1996b. Writing an operating system with Modula-3. In Proceedings of the ACM Workshop on Compiler Support for System Software (Tucson, AZ, Feb.). 141-148.
-
(1996)
Proceedings of the ACM Workshop on Compiler Support for System Software
, pp. 141-148
-
-
Sirer, E.G.1
Savage, S.2
Pardyak, P.3
Defouw, G.P.4
Alapat, M.A.5
Bershad, B.N.6
-
64
-
-
0344614688
-
Activating networks: A progress report
-
Apr.
-
SMITH, J. M., CALVERT, K. L., MURPHY, S. L., ORMAN, H. K., AND PETERSON, L. L. 1999. Activating networks: A progress report. IEEE Computer 32, 4 (Apr.), 32-41.
-
(1999)
IEEE Computer
, vol.32
, Issue.4
, pp. 32-41
-
-
Smith, J.M.1
Calvert, K.L.2
Murphy, S.L.3
Orman, H.K.4
Peterson, L.L.5
-
65
-
-
0028132513
-
ATOM: A system for building customized program analysis tools
-
(PLDI '94, Orlando, FL, June 20-24), V. Sarkar, B. Ryder, and M. L. Soffa, Chairs. ACM Press, New York, NY
-
SRIVASTAVA, A. AND EUSTACE, A. 1994. ATOM: A system for building customized program analysis tools. In Proceedings of the ACM SIGPLAN '94 Conference on Programming Language, Design and Implementation (PLDI '94, Orlando, FL, June 20-24), V. Sarkar, B. Ryder, and M. L. Soffa, Chairs. ACM Press, New York, NY, 196-205.
-
(1994)
Proceedings of the ACM SIGPLAN '94 Conference on Programming Language, Design and Implementation
, pp. 196-205
-
-
Srivastava, A.1
Eustace, A.2
-
66
-
-
0039088052
-
Fine-grained dynamic instrumentation of commodity operating system kernels
-
(OSDI '99, New Orleans, LA., Feb.). USENIX Assoc., Berkeley, CA
-
TAMCHES, A. AND MILLER, B. P. 1999. Fine-grained dynamic instrumentation of commodity operating system kernels. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI '99, New Orleans, LA., Feb.). USENIX Assoc., Berkeley, CA, 117-130.
-
(1999)
Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation
, pp. 117-130
-
-
Tamches, A.1
Miller, B.P.2
-
67
-
-
84982069422
-
J-kernel: A capability-based operating system for Java
-
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Springer-Verlag, New York, NY
-
VON EICKEN, T., CHANG, C.-C., CZAJKOWSKI, G., HAWBLITZEL, C., HU, D., AND SPOONHOWER, D. 1999. J-Kernel: A capability-based operating system for Java. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, NY, 369-393.
-
(1999)
Lecture Notes in Computer Science
, vol.1603
, pp. 369-393
-
-
Von Eicken, T.1
Chang, C.-C.2
Czajkowski, G.3
Hawblitzel, C.4
Hu, D.5
Spoonhower, D.6
-
68
-
-
0027836576
-
Efficient software-based fault isolation
-
(Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. 1993. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles (Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY, 203-216.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
69
-
-
0003396725
-
-
Ph.D. Dissertation. Department of Computer Science, Princeton Univ., Princeton, NJ
-
WALLACH, D. S. 1999. A new approach to mobile code security. Ph.D. Dissertation. Department of Computer Science, Princeton Univ., Princeton, NJ.
-
(1999)
A New Approach to Mobile Code Security
-
-
Wallach, D.S.1
-
70
-
-
0031677290
-
Understanding Java stack introspection
-
(Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
WALLACH, D. S. AND FELTEN, E. W. 1998. Understanding Java stack introspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 52-63.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Wallach, D.S.1
Felten, E.W.2
-
71
-
-
0031542975
-
Extensible security architectures for Java
-
(Saint-Malo, France, Oct.). ACM, New York, NY
-
WALLACH, D. S., BALFANZ, D., DEAN, D., AND FELTEN, E. W. 1997. Extensible security architectures for Java. In Proceedings of the 16th ACM Symposium on Operating System Principles (Saint-Malo, France, Oct.). ACM, New York, NY, 116-128.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
73
-
-
85084160821
-
Using smart clients to build scalable services
-
(Anaheim, CA, Jan.). USENIX Assoc., Berkeley, CA
-
YOSHIKAWA, C., CHUN, B., EASTHAM, P., VAHDAT, A., ANDERSON, T., AND CULLER, D. 1997. Using smart clients to build scalable services. In Proceedings of the 1997 USENIX Annual Technical Conference (Anaheim, CA, Jan.). USENIX Assoc., Berkeley, CA, 105-117.
-
(1997)
Proceedings of the 1997 USENIX Annual Technical Conference
, pp. 105-117
-
-
Yoshikawa, C.1
Chun, B.2
Eastham, P.3
Vahdat, A.4
Anderson, T.5
Culler, D.6
|