메뉴 건너뛰기




Volumn , Issue , 2002, Pages 108-115

Sub-operating systems: A new approach to application security

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; ACTIVE CONTENT; APPLICATION SECURITY; DATA FILES; DATA OBJECTS; FILE OWNER; JAVASCRIPT; MICROSOFT WORD; NEW APPROACHES; OPERATING SYSTEMS; PROTECTION MECHANISMS; SECURITY CONTEXT; SYSTEM APPLICATIONS; USER ID;

EID: 33645977900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133373.1133394     Document Type: Conference Paper
Times cited : (29)

References (30)
  • 1
    • 84862431569 scopus 로고    scopus 로고
    • CERT Advisories. http://www.cert.org/advisories/.
    • CERT Advisories
  • 3
    • 85084161234 scopus 로고    scopus 로고
    • Mapbox: Using parameterized behavior classes to confine applications
    • Denver, CO, August
    • A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the 2000 USENIX Security Symposium, pages 1-17, Denver, CO, August 2000.
    • (2000) Proceedings of the 2000 USENIX Security Symposium , pp. 1-17
    • Acharya, A.1    Raje, M.2
  • 18
    • 77954485300 scopus 로고
    • SUID and SGID Based Attacks on UNIX: A Look at One Form of the Use and Abuse of Privileges
    • R. Kaplan. SUID and SGID Based Attacks on UNIX: a Look at One Form of the Use and Abuse of Privileges. Computer Security Journal, 9(1):73-7, 1993.
    • (1993) Computer Security Journal , vol.9 , Issue.1 , pp. 73-77
    • Kaplan, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.