-
1
-
-
85010790255
-
-
ESD-TR-73-51, HQ Electronic Systems Division (AFSC), L.G. Hanscom Field, Bedford, MA, October
-
Andersen, J. (1972), "Computer security technology planning study", ESD-TR-73-51, HQ Electronic Systems Division (AFSC), L.G. Hanscom Field, Bedford, MA, October, Vol. 1/2.
-
(1972)
Computer Security Technology Planning Study
, vol.12
-
-
Andersen, J.1
-
3
-
-
85008038596
-
Improving the TCPA specification
-
August
-
Arbaugh, B. (2002), "Improving the TCPA specification", IEEE Computer, Vol. 38 No. 5, August, pp. 77-9.
-
(2002)
IEEE Computer
, vol.38
, Issue.5
, pp. 77-79
-
-
Arbaugh, B.1
-
5
-
-
0042985343
-
Understanding Java card 2.0
-
March
-
Chen, Z. (1998), "Understanding Java Card 2.0", Javaworld Magazine, March.
-
(1998)
Javaworld Magazine
-
-
Chen, Z.1
-
6
-
-
0042484570
-
-
Addison-Wesley, Reading, MA
-
Cheswick, W. and Bellovin, S. (1994), Building Internet Firewalls, Addison-Wesley, Reading, MA.
-
(1994)
Building Internet Firewalls
-
-
Cheswick, W.1
Bellovin, S.2
-
7
-
-
0041983766
-
Giving currency to the Java card API
-
Coleman, A. (1998), "Giving currency to the Java Card API", Javaworld Magazine.
-
(1998)
Javaworld Magazine
-
-
Coleman, A.1
-
8
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
July, New York, NY
-
Erlingsson, U. and Schneider, F. (1999), "SASI enforcement of security policies: a retrospective", ACM New Security Paradigms Workshop, July, New York, NY, pp. 246-55.
-
(1999)
ACM New Security Paradigms Workshop
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.2
-
10
-
-
84860518634
-
Personal security environment on palm PDA
-
New Orleans, LA, 11-15 December
-
Freudenthal, M., Heiberg, S. and Willemson, J. (2000), "Personal security environment on palm PDA", 16th Annual Computer Security Applications Conference (ACSAC '00), New Orleans, LA, 11-15 December.
-
(2000)
16th Annual Computer Security Applications Conference (ACSAC '00)
-
-
Freudenthal, M.1
Heiberg, S.2
Willemson, J.3
-
11
-
-
85084161234
-
MAPbox: Using parameterized behavior classes to confine untrusted applications
-
Denver, CO
-
Fu, K., Sit, E., Smith, K. and Feamster, N. (2000), "MAPbox: using parameterized behavior classes to confine untrusted applications", 9th USENIX UNIX Security Symposium, Denver, CO.
-
(2000)
9th USENIX UNIX Security Symposium
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
12
-
-
0042456767
-
-
O'Reilly & Associates, Sebastopol, CA
-
Garfinkel, S. and Spafford, G. (2002), Web Security, Privacy and Commerce, 2nd ed., O'Reilly & Associates, Sebastopol, CA.
-
(2002)
Web Security, Privacy and Commerce, 2nd Ed.
-
-
Garfinkel, S.1
Spafford, G.2
-
13
-
-
0004712961
-
-
Wiley Computer Publishing, New York, NY
-
Ghosh, A. (1998), E-Commerce Security: Weak Links, Best Defenses, Wiley Computer Publishing, New York, NY.
-
(1998)
E-Commerce Security: Weak Links, Best Defenses
-
-
Ghosh, A.1
-
15
-
-
0007770188
-
An approach for certifying security in software components
-
National Institute of Standards and Technology (MIST), Crystal City, VA
-
Ghosh, A. and McGraw, G. (1998), "An approach for certifying security in software components", 21st National Information Systems Security Conference, National Institute of Standards and Technology (MIST), Crystal City, VA, pp. 82-6.
-
(1998)
21st National Information Systems Security Conference
, pp. 82-86
-
-
Ghosh, A.1
McGraw, G.2
-
16
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security achitecture in the Java development kit (JDK) 1.2
-
Monterey, CA, December
-
Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997), "Going beyond the sandbox: an overview of the new security achitecture in the Java development kit (JDK) 1.2", USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December, pp. 103-12.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
17
-
-
0001977949
-
Addressing threats and security issues in World Wide Web technology
-
Athens, Greece
-
Gritzalis, S. and Spinellis, D. (1997) "Addressing threats and security issues in World Wide Web technology", 3rd International Conference on Communications and Multimedia Security, Athens, Greece, pp. 33-46.
-
(1997)
3rd International Conference on Communications and Multimedia Security
, pp. 33-46
-
-
Gritzalis, S.1
Spinellis, D.2
-
18
-
-
0041983759
-
Programming languages for mobile code: A problems viewpoint
-
Plymouth
-
Gritzalis, S., Aggelis, G. and Spinellis, D. (1998), "Programming languages for mobile code: a problems viewpoint", 1st International Network Conference INC '98, Plymouth, pp. 210-17.
-
(1998)
1st International Network Conference INC '98
, pp. 210-217
-
-
Gritzalis, S.1
Aggelis, G.2
Spinellis, D.3
-
19
-
-
0004241913
-
Efficient code certification
-
Cornell University, January
-
Kozen, D. (1998), Efficient Code Certification, Tech. Report 98-1661, Cornell University, January.
-
(1998)
Tech. Report
, vol.98
-
-
Kozen, D.1
-
22
-
-
0004220511
-
-
Addison-Wesley, Reading, MA
-
Lindhorn, T. and Yellin, F. (1997), The Java Virtual Machine Specification, Addison-Wesley, Reading, MA.
-
(1997)
The Java Virtual Machine Specification
-
-
Lindhorn, T.1
Yellin, F.2
-
25
-
-
0004014446
-
-
Wiley Computer Publishing, New York, NY
-
McGraw, G. and Felten, E. (2000), "Securing Java", Wiley Computer Publishing, New York, NY.
-
(2000)
Securing Java
-
-
McGraw, G.1
Felten, E.2
-
26
-
-
0030645532
-
Blocking Java applets at the firewall
-
San Diego, CA, March, (accessed 6 November 2002)
-
Martin, D. Jr, Rajagopalan, S. and Rubin, A. (1997), "Blocking Java applets at the firewall", 1997 IEEE Symposium on Network and Distributed Systems Security, San Diego, CA, March, available at: www.cs.bu.edu/techreports/96-026-java-firewalls.ps.Z (accessed 6 November 2002).
-
(1997)
1997 IEEE Symposium on Network and Distributed Systems Security
-
-
Martin, D.1
Rajagopalan, S.2
Rubin, A.3
-
27
-
-
0011500045
-
Addressing threats in World Wide Web technology
-
Meyer, K., Schaeffer, S., Baker, D. and Manning, S. (1995) "Addressing threats in World Wide Web technology", 11th Annual Computer Security Applications Conference, pp. 123-3.
-
(1995)
11th Annual Computer Security Applications Conference
, pp. 123-123
-
-
Meyer, K.1
Schaeffer, S.2
Baker, D.3
Manning, S.4
-
28
-
-
85010801338
-
Code signing with Microsoft authenticode
-
Microsoft Corporation (2001) "Code signing with Microsoft authenticode", MSDN Library Online.
-
(2001)
MSDN Library Online
-
-
-
29
-
-
18844373581
-
-
White Paper, August, (accessed 6 November 2002)
-
Microsoft Corporation (2002), Microsoft "Palladium": A Business Overview, White Paper, August, available at: www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp (accessed 6 November 2002).
-
(2002)
Microsoft "Palladium": A Business Overview
-
-
-
30
-
-
85084097858
-
Safe kernel extensions without run-time checking
-
Seattle, Washington, DC, October
-
Necula, G. and Lee, P. (1996), "Safe kernel extensions without run-time checking", 2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI '96, Seattle, Washington, DC, October.
-
(1996)
2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI '96)
-
-
Necula, G.1
Lee, P.2
-
31
-
-
0041983700
-
-
accessed 20 November 2001
-
NSA (2001), "Security enhanced Linux (SELinux)", available at: www.nsa.gov/selinux/(accessed 20 November 2001).
-
(2001)
Security Enhanced Linux (SELinux)
-
-
-
34
-
-
84976845043
-
End-to-end arguments in system design
-
Saltzer, J., Reed, D. and Clark, D. (1984), "End-to-end arguments in system design", ACM Transactions on Computer Systems, Vol. 2 No. 4, pp. 277-88.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
35
-
-
0042484571
-
Palladium and the TCPA
-
15 August, (accessed 6 November 2002)
-
Schneier, B. (2002), "Palladium and the TCPA", Crypto-Gram Newsletter, 15 August, Counterpane Internet Security, Inc., available at: www.counterpane.com/crypto-gram-0208.html (accessed 6 November 2002).
-
(2002)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
36
-
-
0041983756
-
-
July 8, (accessed 6 November 2002)
-
Schoen, S. (2002), "Palladium details", ActiveWin.com, July 8, available at: www.activewin.com/articles/2002/pd.shtml (accessed 6 November 2002).
-
(2002)
Palladium Details
-
-
Schoen, S.1
-
37
-
-
0003885423
-
-
Addison-Wesley, Reading, MA
-
Sommerville, I. (2001), Software Engineering, 6th Edition, Addison-Wesley, Reading, MA.
-
(2001)
Software Engineering, 6th Edition
-
-
Sommerville, I.1
-
40
-
-
0042985329
-
-
accessed 10 November 2001
-
Visa International (2001), "Chip migration plan", available at www.visa.com (accessed 10 November 2001).
-
(2001)
Chip Migration Plan
-
-
-
41
-
-
0042985326
-
-
accessed 10 November 2001
-
VMware Inc. (2000), "VMware GSX server", available at: www.vmware.com/pdf/gsx_whitepaper.pdf (accessed 10 November 2001).
-
(2000)
VMware GSX Server
-
-
-
42
-
-
0027836576
-
Efficient software-based fault isolation
-
Asheville, NC
-
Wahbe, R., Lucco, S., Andersen, T. and Graham, S. (1993), "Efficient software-based fault isolation", 14th ACM Symposium on Operating Systems Principles (SOSP' 93, Asheville, NC, pp. 203-16.
-
(1993)
14th ACM Symposium on Operating Systems Principles (SOSP' 93)
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Andersen, T.3
Graham, S.4
-
43
-
-
0031677290
-
Understanding Java stack inspection
-
Oakland, CA, May
-
Wallach, D. and Felten, E. (1998), "Understanding Java stack inspection", 1938 IEEE Symposium on Security and Privacy (SOSP' 98), Oakland, CA, May.
-
(1998)
1938 IEEE Symposium on Security and Privacy (SOSP' 98)
-
-
Wallach, D.1
Felten, E.2
-
44
-
-
84967447613
-
-
O'Reilly & Associates, Sebastopol, CA
-
Zwicky, E., Cooper, S. and Chapman, D. (2000), Building Internet Firewalls, 2nd Edition, O'Reilly & Associates, Sebastopol, CA.
-
(2000)
Building Internet Firewalls, 2nd Edition
-
-
Zwicky, E.1
Cooper, S.2
Chapman, D.3
|