-
2
-
-
0003396725
-
-
Ph.D. dissertation, Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Jan.
-
D. S. Wallach, "A New Approach to Mobile Code Security," Ph.D. dissertation, Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Jan. 1999.
-
(1999)
A New Approach to Mobile Code Security
-
-
Wallach, D.S.1
-
3
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
T. Sander and C. F. Tschudin, "Protecting mobile agents against malicious hosts," Mobile Agent and Security, Lecture Notes in Computer Science, vol. 1419, pp. 44-60, 1998.
-
(1998)
Mobile Agent and Security, Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
4
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Baltimore, MD, Oct.
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell, "The inevitability of failure: the flawed assumption of security in modern computing environments," in Proc. 21st National Information Systems Security Conf., Baltimore, MD, Oct. 1998, pp. 303-314.
-
(1998)
Proc. 21st National Information Systems Security Conf.
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
5
-
-
0010951688
-
Securing the node of an active network
-
S. Hariri, C. Lee, and C. Raghavendra, Eds. Boston, MA: Kluwer, Sept.
-
Z. Liu, R. H. Campbell, and M. D. Mickunas, "Securing the node of an active network," in Active Middleware Services. S. Hariri, C. Lee, and C. Raghavendra, Eds. Boston, MA: Kluwer, Sept. 2000.
-
(2000)
Active Middleware Services
-
-
Liu, Z.1
Campbell, R.H.2
Mickunas, M.D.3
-
6
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu and E. J. Coyne, "Role-based access control models," IEEE Computer, vol. 29, no. 2, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
7
-
-
0242434993
-
-
[Online]
-
The SwitchWare Project Homepage at the University of Pennsylvania. [Online] Available http://www.cis.upenn.edu/̃switchware/
-
The SwitchWare Project Homepage
-
-
-
8
-
-
84961734844
-
An agent based architecture for supporting application level security
-
Hilton Head Island, SC, Jan. 25-27
-
Z. Liu, P. Naldurg, S. Yi, T. Qian, R. H. Campbell, and M. D. Mickunas, "An agent based architecture for supporting application level security," in Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00), vol. 1, Hilton Head Island, SC, Jan. 25-27, 2000, pp. 187-198.
-
(2000)
Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00)
, vol.1
, pp. 187-198
-
-
Liu, Z.1
Naldurg, P.2
Yi, S.3
Qian, T.4
Campbell, R.H.5
Mickunas, M.D.6
-
11
-
-
0242677219
-
Making login services independent from authentication technologies
-
Mar.
-
V. Samar and C. Lai, "Making login services independent from authentication technologies," in Proc. SunSoft Developer's Conf., Mar. 1996.
-
(1996)
Proc. SunSoft Developer's Conf.
-
-
Samar, V.1
Lai, C.2
-
12
-
-
0042748417
-
Internet X.509 Public Key Infrastructure Certificates Management Protocols
-
Mar.
-
C. Adams and S. Farrell, Internet X.509 Public Key Infrastructure Certificates Management Protocols, RFC 2510, Mar. 1999.
-
(1999)
RFC
, vol.2510
-
-
Adams, C.1
Farrell, S.2
-
14
-
-
0345673605
-
Generic Security Service Application Program Interface, Ver. 2
-
Jan.
-
J. Linn, Generic Security Service Application Program Interface, Ver. 2, RFC 2078, Jan. 1997.
-
(1997)
RFC
, vol.2078
-
-
Linn, J.1
-
15
-
-
0242434979
-
Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API)
-
Dec.
-
C. Adams, Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API), RFC 2479, Dec. 1998.
-
(1998)
RFC
, vol.2479
-
-
Adams, C.1
-
18
-
-
0242687208
-
Secure information flow in mobile bootstrapping process
-
Taipei, Taiwan, R.O.C., Apr.
-
Z. Liu, M. D. Mickunas, and R. H. Campbell, "Secure information flow in mobile bootstrapping process," in Int. Workshop on Wireless Networks and Mobile Computing (With ICDCS 2000), Taipei, Taiwan, R.O.C., Apr. 2000.
-
(2000)
Int. Workshop on Wireless Networks and Mobile Computing (with ICDCS 2000)
-
-
Liu, Z.1
Mickunas, M.D.2
Campbell, R.H.3
-
19
-
-
0012023903
-
The Kerberos Ver. 5 GSS-API Mechanism
-
June
-
J. Linn, The Kerberos Ver. 5 GSS-API Mechanism, RFC 1964, June 1996.
-
(1996)
RFC
, vol.1964
-
-
Linn, J.1
-
20
-
-
0242603234
-
The Simple Public-Key GSS-API Mechanism (SPKM)
-
Oct.
-
C. Adams, The Simple Public-Key GSS-API Mechanism (SPKM), RFC 2025, Oct. 1996.
-
(1996)
RFC
, vol.2025
-
-
Adams, C.1
-
22
-
-
0242434986
-
-
Ph.D. dissertation, Dept. Comput. Sci., Univ. Illinois at Urbana-Champaign, Oct.
-
Z. Liu, "Securing the Node of an Active Network," Ph.D. dissertation, Dept. Comput. Sci., Univ. Illinois at Urbana-Champaign, Oct. 2001.
-
(2001)
Securing the Node of an Active Network
-
-
Liu, Z.1
-
23
-
-
0242687209
-
-
[Online]
-
IAIK-JCE package. [Online] Available http://jcewww.iaik.tu-graz.ac.at/
-
IAIK-JCE Package
-
-
-
24
-
-
0242518522
-
-
[Online]
-
Snacc for Java. [Online] Available http://www.alphaworks.ibm.com/tech/snaccforjava
-
Snacc for Java
-
-
-
25
-
-
0003308762
-
Internet X.509 Public Key Infrastructure Certificate and CRL Profile
-
Jan.
-
R. Housley, W. Ford, W. Polk, and D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, Jan. 1999.
-
(1999)
RFC
, vol.2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
26
-
-
0003618441
-
-
NIST, Oct.
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback, "Report on the Development of the Advanced Encryption Standard (AES)," NIST, Oct. 2000.
-
(2000)
Report on the Development of the Advanced Encryption Standard (AES)
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
27
-
-
84969377247
-
User authentication and authorization in the Java platform
-
Phoenix. AZ, Dec. 6-10
-
C. Lai, L. Gong, L. Koved, A. Nadalin, and R. Schemers, "User authentication and authorization in the Java platform," in 15th Annu. Computer Security Applications Conf., Phoenix. AZ, Dec. 6-10, 1999.
-
(1999)
15th Annu. Computer Security Applications Conf.
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.4
Schemers, R.5
-
29
-
-
0029232070
-
A higher level of computer security through active policies
-
M. D. Abrams and J. D. Moffett, "A higher level of computer security through active policies," Comput. Security, vol. 14, no. 2, pp. 147-157, 1995.
-
(1995)
Comput. Security
, vol.14
, Issue.2
, pp. 147-157
-
-
Abrams, M.D.1
Moffett, J.D.2
-
30
-
-
0004241913
-
Efficient Code Certification
-
Jan.
-
D. Kozen, "Efficient Code Certification," Dept. Comput. Sci., Cornell Univ., Ithaca, NY, Tech. Rep. 98-1661, Jan. 1998.
-
(1998)
Dept. Comput. Sci., Cornell Univ., Ithaca, NY, Tech. Rep.
, vol.1661
-
-
Kozen, D.1
-
31
-
-
85170567129
-
Low-level security in Java
-
Dec.
-
F. Yelin, "Low-level security in Java," in WWW4 Conference, Dec. 1995.
-
(1995)
WWW4 Conference
-
-
Yelin, F.1
-
34
-
-
84983308848
-
ANTS: A toolkit for building and dynamically deploying network protocols
-
San Francisco, CA, Apr.
-
D. Wetherall, J. Guttag, and D. Tennenhouse, "ANTS: a toolkit for building and dynamically deploying network protocols," in IEEE OPENARCH'98, San Francisco, CA, Apr. 1998.
-
(1998)
IEEE OPENARCH'98
-
-
Wetherall, D.1
Guttag, J.2
Tennenhouse, D.3
-
35
-
-
84962248491
-
Seraphim: Dynamic interoperable security architecture for active networks
-
Tel-Aviv, Israel, Mar. 26-27
-
R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi, "Seraphim: dynamic interoperable security architecture for active networks," in IEEE OPENARCH 2000, Tel-Aviv, Israel, Mar. 26-27, 2000.
-
(2000)
IEEE OPENARCH 2000
-
-
Campbell, R.H.1
Liu, Z.2
Mickunas, M.D.3
Naldurg, P.4
Yi, S.5
-
36
-
-
27744560030
-
Flexible secure multicasting in active networks
-
Taipei, Taiwan, R.O.C., Apr.
-
Z. Liu, R. H. Campbell, S. K. Varadarajan, P. Naldurg, S. Yi, and M. D. Mickunas, "Flexible secure multicasting in active networks," in Int. Workshop on Group Computation and Communications (With ICDCS 2000), Taipei, Taiwan, R.O.C., Apr. 2000.
-
(2000)
Int. Workshop on Group Computation and Communications (with ICDCS 2000)
-
-
Liu, Z.1
Campbell, R.H.2
Varadarajan, S.K.3
Naldurg, P.4
Yi, S.5
Mickunas, M.D.6
-
37
-
-
84883894665
-
Security as services in active networks
-
Taormina, Italy, July
-
Z. Liu, R. H. Campbell, and M. D. Mickunas, "Security as services in active networks," in Seventh IEEE Symp. Computers and Communications (ISCC '02), Taormina, Italy, July 2002.
-
(2002)
Seventh IEEE Symp. Computers and Communications (ISCC '02)
-
-
Liu, Z.1
Campbell, R.H.2
Mickunas, M.D.3
-
39
-
-
84940110094
-
Flexible policy-directed code safety
-
Oakland, CA, May 9-12
-
D. Evans and A. Twyman, "Flexible policy-directed code safety, " in IEEE Symp. Security and Privacy, Oakland, CA, May 9-12, 1999.
-
(1999)
IEEE Symp. Security and Privacy
-
-
Evans, D.1
Twyman, A.2
-
40
-
-
0003226048
-
The KeyNote Trust-Management System Ver. 2
-
June
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The KeyNote Trust-Management System Ver. 2, RFC 1809, June 1995.
-
(1995)
RFC
, vol.1809
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
41
-
-
0041859446
-
DTOS General System Security and Assurability Assessment Report
-
June
-
Secure Computing Corporation, "DTOS General System Security and Assurability Assessment Report,", Tech. Rep. MD A904-93-C-4209 CDRL A011, June 1997.
-
(1997)
Tech. Rep.
, vol.MD A904-93-C-4209 CDRL A011
-
-
-
42
-
-
0030686713
-
Secure applications need flexible operating systems
-
Chatham, MA, May
-
D. Mazières and M. F. Kaashoek, "Secure applications need flexible operating systems," in Proc. 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), Chatham, MA, May 1997, pp. 56-61.
-
(1997)
Proc. 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
, pp. 56-61
-
-
Mazières, D.1
Kaashoek, M.F.2
-
43
-
-
0242434988
-
-
private communication
-
S. Schwab, private communication.
-
-
-
Schwab, S.1
-
44
-
-
85084160641
-
The Flask security architecture: System support for diverse security policies
-
Aug.
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The Flask security architecture: system support for diverse security policies," in Proc. Eighth USENIX Security Symp., Aug. 1999, pp. 123-139.
-
(1999)
Proc. Eighth USENIX Security Symp.
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
45
-
-
85084163247
-
Providing policy control over object operations in a Mach based system
-
June
-
S. E. Minear, "Providing policy control over object operations in a Mach based system," in Proc. Fifth USENIX UNIX Security Symp., June 1995, pp. 141-156.
-
(1995)
Proc. Fifth USENIX UNIX Security Symp.
, pp. 141-156
-
-
Minear, S.E.1
-
46
-
-
84961751347
-
Retrofitting security into internet infrastructure protocols
-
Hilton Head Island, SC, Jan. 25-27
-
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington, "Retrofitting security into internet infrastructure protocols," in Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00), vol. 1, Hilton Head Island, SC, Jan. 25-27, 2000, pp. 3-17.
-
(2000)
Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00)
, vol.1
, pp. 3-17
-
-
Murphy, S.1
Gudmundsson, O.2
Mundy, R.3
Wellington, B.4
-
48
-
-
84962141555
-
Strong security for active networks
-
Anchorage, AK, Apr.
-
S. Murphy, E. Lewis, R. Watson, and R. Yee, "Strong security for active networks," in IEEE OPENARCH 2001, Anchorage, AK, Apr. 2001.
-
(2001)
IEEE OPENARCH 2001
-
-
Murphy, S.1
Lewis, E.2
Watson, R.3
Yee, R.4
-
49
-
-
0003288391
-
Domain Name System Security Extensions
-
Mar.
-
D. Eastlake, Domain Name System Security Extensions, RFC 2535, Mar. 1999.
-
(1999)
RFC
, vol.2535
-
-
Eastlake, D.1
-
51
-
-
0242603240
-
A specification-based coverage metric to evaluate test sets, international journal of reliability
-
Dec.
-
P. E. Ammann and P. E. Black, "A specification-based coverage metric to evaluate test sets, international journal of reliability," Qual. Safety Eng., Dec. 2000.
-
(2000)
Qual. Safety Eng.
-
-
Ammann, P.E.1
Black, P.E.2
-
52
-
-
84960845192
-
Mutation operators for specifications
-
Grenoble, France, Sept.
-
P. E. Black, V. Okun, and Y. Yesha, "Mutation operators for specifications," in Proc. 15th Automated Software Engineering Conf. (ASE2000), Grenoble, France, Sept. 2000.
-
(2000)
Proc. 15th Automated Software Engineering Conf. (ASE2000)
-
-
Black, P.E.1
Okun, V.2
Yesha, Y.3
-
53
-
-
84949497326
-
Maude as a formal meta-tool
-
FM'99 - Formal Methods, J. Wing and J. Woodcock, Eds. Berlin, Germany: Springer-Verlag
-
M. Clavel, F. Duran, S. Eker, J. Meseguer, and M.-O. Stehr, "Maude as a formal meta-tool," in FM'99 - Formal Methods, J. Wing and J. Woodcock, Eds. Berlin, Germany: Springer-Verlag, 1999, vol. 1709, Lecture Notes in Computer Science, pp. 1684-1703.
-
(1999)
Lecture Notes in Computer Science
, vol.1709
, pp. 1684-1703
-
-
Clavel, M.1
Duran, F.2
Eker, S.3
Meseguer, J.4
Stehr, M.-O.5
-
54
-
-
84961707449
-
Formal specification and analysis of active networks and communication protocols: The Maude experience
-
Hilton Head, South Carolina, Jan.
-
G. Denker, J. Meseguer, and C. Talcott, "Formal specification and analysis of active networks and communication protocols: the Maude experience," in Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00), vol. 1, Hilton Head, South Carolina, Jan. 2000, pp. 251-265.
-
(2000)
Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00)
, vol.1
, pp. 251-265
-
-
Denker, G.1
Meseguer, J.2
Talcott, C.3
|