메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 51-

Identity boxing: A new technique for consistent global identity

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INTELLIGENT AGENTS; METADATA; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33845413675     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SC.2005.34     Document Type: Conference Paper
Times cited : (6)

References (44)
  • 8
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • August
    • D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium, August 2004.
    • (2004) USENIX Security Symposium
    • Brumley, D.1    Song, D.2
  • 14
    • 0030357690 scopus 로고    scopus 로고
    • An integrated biosphere model of land surface processes, terrestrial carbon balance, and vegetation dynamics
    • J. Foley. An integrated biosphere model of land surface processes, terrestrial carbon balance, and vegetation dynamics. Global Biogeochemical Cycles, 10(4):603-628, 1996.
    • (1996) Global Biogeochemical Cycles , vol.10 , Issue.4 , pp. 603-628
    • Foley, J.1
  • 19
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in in system call interposition based security tools
    • February
    • T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In Network and Distributed Systems Security Symposium, February 2003.
    • (2003) Network and Distributed Systems Security Symposium
    • Garfinkel, T.1
  • 23
    • 0012116506 scopus 로고    scopus 로고
    • CMS data grid system overview and requirements
    • CERN, July
    • K. Holtman. CMS data grid system overview and requirements. CMS Note 2001/037, CERN, July 2001.
    • (2001) CMS Note , vol.2001 , Issue.37
    • Holtman, K.1
  • 27
    • 33645977900 scopus 로고    scopus 로고
    • Sub-operating systems: A new approach to application security
    • February
    • S. Ioannidis and S. M. Bellovin. Sub-operating systems: A new approach to application security. In SIGOPS European Workshop, February 2000.
    • (2000) SIGOPS European Workshop
    • Ioannidis, S.1    Bellovin, S.M.2
  • 30
    • 12344251862 scopus 로고    scopus 로고
    • Secure execution environment via program shepherding
    • August
    • V. L. Kiriansky. Secure execution environment via program shepherding. In USENIX Security Symposium, August 2002.
    • (2002) USENIX Security Symposium
    • Kiriansky, V.L.1
  • 31
  • 34
    • 4344665550 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • August
    • N. Proves. Improving host security with system call policies. In USENIX Security Symposium, August 2004.
    • (2004) USENIX Security Symposium
    • Proves, N.1
  • 41
    • 14244256931 scopus 로고    scopus 로고
    • Parrot: Transparent user-level middleware for data-intensive computing
    • New Orleans, September
    • D. Thain and M. Livny. Parrot: Transparent user-level middleware for data-intensive computing. In Proceedings of the Workshop on Adaptive Grid Middleware, New Orleans, September 2003.
    • (2003) Proceedings of the Workshop on Adaptive Grid Middleware
    • Thain, D.1    Livny, M.2
  • 43
    • 4444245370 scopus 로고    scopus 로고
    • Denali: Lightweight virtual machines for distributed and networked applications
    • June
    • A. Whitaker, M. Shaw, and S. D. Gribble. Denali: Lightweight virtual machines for distributed and networked applications. In USENIX Annual Technical Conference, June 2002.
    • (2002) USENIX Annual Technical Conference
    • Whitaker, A.1    Shaw, M.2    Gribble, S.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.