메뉴 건너뛰기




Volumn 11, Issue 2-3, 2003, Pages 84-91

Security architectures for network clients

Author keywords

Clients; Computer architectures; Networks; Security; Software

Indexed keywords

COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; DATA PRIVACY; JAVA PROGRAMMING LANGUAGE;

EID: 0042363358     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220310468664     Document Type: Review
Times cited : (8)

References (44)
  • 1
    • 85010790255 scopus 로고
    • ESD-TR-73-51, HQ Electronic Systems Division (AFSC), L.G. Hanscom Field, Bedford, MA, October
    • Andersen, J. (1972), "Computer security technology planning study", ESD-TR-73-51, HQ Electronic Systems Division (AFSC), L.G. Hanscom Field, Bedford, MA, October, Vol. 1/2.
    • (1972) Computer Security Technology Planning Study , vol.12
    • Andersen, J.1
  • 3
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • August
    • Arbaugh, B. (2002), "Improving the TCPA specification", IEEE Computer, Vol. 38 No. 5, August, pp. 77-9.
    • (2002) IEEE Computer , vol.38 , Issue.5 , pp. 77-79
    • Arbaugh, B.1
  • 5
    • 0042985343 scopus 로고    scopus 로고
    • Understanding Java card 2.0
    • March
    • Chen, Z. (1998), "Understanding Java Card 2.0", Javaworld Magazine, March.
    • (1998) Javaworld Magazine
    • Chen, Z.1
  • 7
    • 0041983766 scopus 로고    scopus 로고
    • Giving currency to the Java card API
    • Coleman, A. (1998), "Giving currency to the Java Card API", Javaworld Magazine.
    • (1998) Javaworld Magazine
    • Coleman, A.1
  • 8
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • July, New York, NY
    • Erlingsson, U. and Schneider, F. (1999), "SASI enforcement of security policies: a retrospective", ACM New Security Paradigms Workshop, July, New York, NY, pp. 246-55.
    • (1999) ACM New Security Paradigms Workshop , pp. 246-255
    • Erlingsson, U.1    Schneider, F.2
  • 11
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using parameterized behavior classes to confine untrusted applications
    • Denver, CO
    • Fu, K., Sit, E., Smith, K. and Feamster, N. (2000), "MAPbox: using parameterized behavior classes to confine untrusted applications", 9th USENIX UNIX Security Symposium, Denver, CO.
    • (2000) 9th USENIX UNIX Security Symposium
    • Fu, K.1    Sit, E.2    Smith, K.3    Feamster, N.4
  • 15
    • 0007770188 scopus 로고    scopus 로고
    • An approach for certifying security in software components
    • National Institute of Standards and Technology (MIST), Crystal City, VA
    • Ghosh, A. and McGraw, G. (1998), "An approach for certifying security in software components", 21st National Information Systems Security Conference, National Institute of Standards and Technology (MIST), Crystal City, VA, pp. 82-6.
    • (1998) 21st National Information Systems Security Conference , pp. 82-86
    • Ghosh, A.1    McGraw, G.2
  • 16
    • 84887507059 scopus 로고    scopus 로고
    • Going beyond the sandbox: An overview of the new security achitecture in the Java development kit (JDK) 1.2
    • Monterey, CA, December
    • Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997), "Going beyond the sandbox: an overview of the new security achitecture in the Java development kit (JDK) 1.2", USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December, pp. 103-12.
    • (1997) USENIX Symposium on Internet Technologies and Systems , pp. 103-112
    • Gong, L.1    Mueller, M.2    Prafullchandra, H.3    Schemers, R.4
  • 19
    • 0004241913 scopus 로고    scopus 로고
    • Efficient code certification
    • Cornell University, January
    • Kozen, D. (1998), Efficient Code Certification, Tech. Report 98-1661, Cornell University, January.
    • (1998) Tech. Report , vol.98
    • Kozen, D.1
  • 24
    • 0041482706 scopus 로고    scopus 로고
    • Understanding the keys to Java security
    • McGraw, G. and Felten, E. (1997), "Understanding the keys to Java Security", Javaworld Magazine.
    • (1997) Javaworld Magazine
    • McGraw, G.1    Felten, E.2
  • 25
    • 0004014446 scopus 로고    scopus 로고
    • Wiley Computer Publishing, New York, NY
    • McGraw, G. and Felten, E. (2000), "Securing Java", Wiley Computer Publishing, New York, NY.
    • (2000) Securing Java
    • McGraw, G.1    Felten, E.2
  • 28
    • 85010801338 scopus 로고    scopus 로고
    • Code signing with Microsoft authenticode
    • Microsoft Corporation (2001) "Code signing with Microsoft authenticode", MSDN Library Online.
    • (2001) MSDN Library Online
  • 29
    • 18844373581 scopus 로고    scopus 로고
    • White Paper, August, (accessed 6 November 2002)
    • Microsoft Corporation (2002), Microsoft "Palladium": A Business Overview, White Paper, August, available at: www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp (accessed 6 November 2002).
    • (2002) Microsoft "Palladium": A Business Overview
  • 31
    • 0041983700 scopus 로고    scopus 로고
    • accessed 20 November 2001
    • NSA (2001), "Security enhanced Linux (SELinux)", available at: www.nsa.gov/selinux/(accessed 20 November 2001).
    • (2001) Security Enhanced Linux (SELinux)
  • 35
    • 0042484571 scopus 로고    scopus 로고
    • Palladium and the TCPA
    • 15 August, (accessed 6 November 2002)
    • Schneier, B. (2002), "Palladium and the TCPA", Crypto-Gram Newsletter, 15 August, Counterpane Internet Security, Inc., available at: www.counterpane.com/crypto-gram-0208.html (accessed 6 November 2002).
    • (2002) Crypto-Gram Newsletter
    • Schneier, B.1
  • 36
    • 0041983756 scopus 로고    scopus 로고
    • July 8, (accessed 6 November 2002)
    • Schoen, S. (2002), "Palladium details", ActiveWin.com, July 8, available at: www.activewin.com/articles/2002/pd.shtml (accessed 6 November 2002).
    • (2002) Palladium Details
    • Schoen, S.1
  • 40
    • 0042985329 scopus 로고    scopus 로고
    • accessed 10 November 2001
    • Visa International (2001), "Chip migration plan", available at www.visa.com (accessed 10 November 2001).
    • (2001) Chip Migration Plan
  • 41
    • 0042985326 scopus 로고    scopus 로고
    • accessed 10 November 2001
    • VMware Inc. (2000), "VMware GSX server", available at: www.vmware.com/pdf/gsx_whitepaper.pdf (accessed 10 November 2001).
    • (2000) VMware GSX Server


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.