-
1
-
-
23844556716
-
-
Apache API notes, http://httpd.apache.org/docs/1.3/misc/API.html.
-
Apache API Notes
-
-
-
3
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March
-
David E. Bell and Leonard La Padula. Secure computer system: Unified exposition and Multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Padula, L.L.2
-
5
-
-
0024663398
-
Access mediation in a message passing kernel
-
Oakland, CA, May
-
M. Branstad, Homayoon Tajalli, Frank Mayer, and David Dalva. Access mediation in a message passing kernel. In Proc. 1989 IEEE Symposium on Security and Privacy, pp. 66-72, Oakland, CA, May 1989.
-
(1989)
Proc. 1989 IEEE Symposium on Security and Privacy
, pp. 66-72
-
-
Branstad, M.1
Tajalli, H.2
Mayer, F.3
Dalva, D.4
-
6
-
-
0023979646
-
The v distributed system
-
March
-
David R. Cheriton. The V distributed system. Journal of the ACM, 31(3):314-33, March 1988.
-
(1988)
Journal of the ACM
, vol.31
, Issue.3
, pp. 314-333
-
-
Cheriton, D.R.1
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Oakland, CA, May
-
Timothy Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In P roc. 2000 IEEE Symposium on Security and Privacy, pp. 230-245, Oakland, CA, May 2000.
-
(2000)
P Roc. 2000 IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
12
-
-
0024089972
-
The confused deputy (or why capabilities might have been invented)
-
October
-
Norman Hardy. The confused deputy (or why capabilities might have been invented). Operating Systems Review, 22(4):36-38, October 1988.
-
(1988)
Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
14
-
-
85013593271
-
Flexible control of downloaded executable content
-
May
-
Trent Jaeger, Atul Prakash, Jochen Liedtke, and Nayeem Islam. Flexible control of downloaded executable content. ACM Transactions on Information and System Security, 2(2): 177-228, May 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 177-228
-
-
Jaeger, T.1
Prakash, A.2
Liedtke, J.3
Islam, N.4
-
15
-
-
0023168930
-
Limiting the damage potential of discretionary Trojan horses
-
Oakland, CA, April
-
Paul A. Karger. Limiting the damage potential of discretionary Trojan horses. In Proc. 1987 IEEE Symposium on Security and Privacy, pp. 32-37, Oakland, CA, April 1987.
-
(1987)
Proc. 1987 IEEE Symposium on Security and Privacy
, pp. 32-37
-
-
Karger, P.A.1
-
16
-
-
0021197579
-
An augmented capability architecture to support lattice security and traceability of access
-
Oakland, CA, April
-
Paul A. Karger and Andrew J. Herbert. An augmented capability architecture to support lattice security and traceability of access. In Proc. 1984 IEEE Symposium on Security and Privacy, pp. 2-12, Oakland, CA, April 1984.
-
(1984)
Proc. 1984 IEEE Symposium on Security and Privacy
, pp. 2-12
-
-
Karger, P.A.1
Herbert, A.J.2
-
17
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
Oakland, CA, May
-
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, and Clifford E. Kahn. A VMM security kernel for the VAX architecture. In Proc. 1990 IEEE Symposium on Security and Privacy, pp. 2-19, Oakland, CA, May 1990.
-
(1990)
Proc. 1990 IEEE Symposium on Security and Privacy
, pp. 2-19
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
18
-
-
0041983717
-
-
Key Logic. March SEC009-01
-
Key Logic. The KeyKOS/KeySAFE System Design, March 1989. SEC009-01. http://www.agorics.com/Library/KeyKos/keysafe/Keysafe.html.
-
(1989)
The KeyKOS/KeySAFE System Design
-
-
-
20
-
-
33845403940
-
Building secure high-performance web services with OKWS
-
Boston, MA, June
-
Maxwell Krohn. Building secure high-performance web services with OKWS. In Proc. 2004 USENIX Annual Technical Conference, pp. 185-198, Boston, MA, June 2004.
-
(2004)
Proc. 2004 USENIX Annual Technical Conference
, pp. 185-198
-
-
Krohn, M.1
-
21
-
-
84885608511
-
Make least privilege a right (not a privilege)
-
Santa Fe, NM, June
-
Maxwell Krohn, Petros Efstathopoulos, Cliff Frey, Frans Kaashoek, Eddie Kohler, David Mazières, Robert Morris, Michelle Osborne, Steve VanDeBogart, and David Ziegler. Make least privilege a right (not a privilege). In Proc. 10th Hot Topics in Operating Systems Symposium (HotOS-X), Santa Fe, NM, June 2005.
-
(2005)
Proc. 10th Hot Topics in Operating Systems Symposium (HotOS-X)
-
-
Krohn, M.1
Efstathopoulos, P.2
Frey, C.3
Kaashoek, F.4
Kohler, E.5
Mazières, D.6
Morris, R.7
Osborne, M.8
VanDeBogart, S.9
Ziegler, D.10
-
22
-
-
0019608720
-
Formal models for computer security
-
September
-
Carl E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, September 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
26
-
-
84860042175
-
-
LWIP
-
LWIP. http://savannah.nongnu.org/projects/lwip/.
-
-
-
-
27
-
-
0025022888
-
Beyond the pale of MAC and DAC - Defining new forms of access control
-
Oakland, CA, May
-
Catherine Jensen McCollum, Judith R. Messing, and LouAnna Notargiacomo. Beyond the pale of MAC and DAC - defining new forms of access control. In Proc. 1990 IEEE Symposium on Security and Privacy, pp. 190-200, Oakland, CA, May 1990.
-
(1990)
Proc. 1990 IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
28
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
August
-
M. Douglas McIlroy and James A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
29
-
-
33646166700
-
-
Technical Report SRL2003-02, Johns Hopkins University Systems Research Laboratory
-
Mark S. Miller, Ka-Ping Yee, and Jonathan Shapiro. Capability myths demolished. Technical Report SRL2003-02, Johns Hopkins University Systems Research Laboratory, 2003. http://www.erights.org/elib/capability/duals/.
-
(2003)
Capability Myths Demolished
-
-
Miller, M.S.1
Yee, K.-P.2
Shapiro, J.3
-
30
-
-
4043082675
-
An overview of the Spring system
-
February
-
James G. Mitchell, Jonathan Gibbons, Graham Hamilton, Peter B. Kessler, Yousef Y. A. Khalidi, Panos Kougiouris, Peter Madany, Michael N. Nelson, Michael L. Powell, and Sanjay R. Radia. An overview of the Spring system. In Proc. COMPCON 1994, pp. 122-131, February 1994.
-
(1994)
Proc. COMPCON 1994
, pp. 122-131
-
-
Mitchell, J.G.1
Gibbons, J.2
Hamilton, G.3
Kessler, P.B.4
Khalidi, Y.Y.A.5
Kougiouris, P.6
Madany, P.7
Nelson, M.N.8
Powell, M.L.9
Radia, S.R.10
-
31
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Computer Systems, 9(4):410-442, October 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
33
-
-
85084160127
-
Flash: An efficient and portable Web server
-
Monterey, CA, June
-
Vivek S. Pai, Peter Druschel, and Willy Zwaenepoel. Flash: An efficient and portable Web server. In Proc. 1999 USENIX Annual Technical Conference, pp. 199-212, Monterey, CA, June 1999.
-
(1999)
Proc. 1999 USENIX Annual Technical Conference
, pp. 199-212
-
-
Pai, V.S.1
Druschel, P.2
Zwaenepoel, W.3
-
34
-
-
0001300585
-
Plan 9 from Bell Labs
-
Summer
-
Rob Pike, Dave Presotto, Scan Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom. Plan 9 from Bell Labs. Computing Systems, 8(3):221-254, Summer 1995.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
Presotto, D.2
Dorward, S.3
Flandrena, B.4
Thompson, K.5
Trickey, H.6
Winterbottom, P.7
-
35
-
-
84990666603
-
Accent: A communication oriented network operating system kernel
-
Pacific Grove, CA, December
-
Richard F. Rashid and George G. Robertson. Accent: A communication oriented network operating system kernel. In Proc. 8th ACM Symposium on Operating Systems Principles, pp. 64-75, Pacific Grove, CA, December 1981.
-
(1981)
Proc. 8th ACM Symposium on Operating Systems Principles
, pp. 64-75
-
-
Rashid, R.F.1
Robertson, G.G.2
-
36
-
-
0003366960
-
CHORUS distributed operating system
-
Fall
-
Marc Rozier, Vadim Abrossimov, François Armand, I. Boule, Michel Gien, M. Guillemont, F. Herrmann, Claude Kaiser, S. Langlois, P. Leonard, and W. Neuhauser. CHORUS distributed operating system. Computing Systems, 1:305-370, Fall 1988.
-
(1988)
Computing Systems
, vol.1
, pp. 305-370
-
-
Rozier, M.1
Abrossimov, V.2
Armand, F.3
Boule, I.4
Gien, M.5
Guillemont, M.6
Herrmann, F.7
Kaiser, C.8
Langlois, S.9
Leonard, P.10
Neuhauser, W.11
-
37
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proc. of the IEEE, 63(9): 1278-1308, September 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
38
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
Springer-Verlag, December. LNCS 809
-
Bruce Schneier. Description of a new variable-length key, 64-bit block cipher (Blowfish). In Proc. Fast Software Encryption, Cambridge Security Workshop, pp. 191-204. Springer-Verlag, December 1993. LNCS 809.
-
(1993)
Proc. Fast Software Encryption, Cambridge Security Workshop
, pp. 191-204
-
-
Schneier, B.1
-
39
-
-
0001421170
-
EROS: A fast capability system
-
Kiawah Island, SC, December
-
Jonathan S. Shapiro, Jonathan Smith, and David J. Farber. EROS: A fast capability system. In Proc. 17th ACM Symposium on Operating Systems Principles, pp. 170-185, Kiawah Island, SC, December 1999.
-
(1999)
Proc. 17th ACM Symposium on Operating Systems Principles
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.2
Farber, D.J.3
-
40
-
-
84860042172
-
-
SQLite. http://www.sqlite.org.
-
-
-
-
41
-
-
0025568729
-
Experiences with the Amoeba distributed operating system
-
December
-
Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender, Jack Jansen, and Guido van Rossum. Experiences with the Amoeba distributed operating system. Communications of the ACM, 33(12):46-63, December 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 46-63
-
-
Tanenbaum, A.S.1
Van Renesse, R.2
Van Staveren, H.3
Sharp, G.J.4
Mullender, S.J.5
Jansen, J.6
Van Rossum, G.7
-
43
-
-
21644460050
-
Capriccio: Scalable threads for Internet services
-
Bolton Landing, Lake George, NY, October
-
Rob von Behren, Jeremy Condit, Feng Zhou, George C. Necula, and Eric Brewer. Capriccio: Scalable threads for Internet services. In Proc. 19th ACM Symposium on Operating Systems Principles, pp. 268-281, Bolton Landing, Lake George, NY, October 2003.
-
(2003)
Proc. 19th ACM Symposium on Operating Systems Principles
, pp. 268-281
-
-
Von Behren, R.1
Condit, J.2
Zhou, F.3
Necula, G.C.4
Brewer, E.5
-
44
-
-
33845440496
-
The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
-
San Antonio, TX, June
-
Robert Watson, Wayne Morrison, Chris Vance, and Brian Feldman. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. In Proc. 2003 USENIX Annual Technical Conference, pp. 285-296, San Antonio, TX, June 2003.
-
(2003)
Proc. 2003 USENIX Annual Technical Conference
, pp. 285-296
-
-
Watson, R.1
Morrison, W.2
Vance, C.3
Feldman, B.4
-
45
-
-
0036041527
-
SEDA: An architecture for well-conditioned, scalable Internet services
-
Château Lake Louise, Alberta, Canada, October
-
Matt Welsh, David Culler, and Eric Brewer. SEDA: An architecture for well-conditioned, scalable Internet services. In Proc. 18th ACM Symposium on Operating Systems Principles, pp. 230-243, Château Lake Louise, Alberta, Canada, October 2001.
-
(2001)
Proc. 18th ACM Symposium on Operating Systems Principles
, pp. 230-243
-
-
Welsh, M.1
Culler, D.2
Brewer, E.3
-
46
-
-
84978438355
-
Scale and performance in the Denali isolation kernel
-
Boston, MA, December
-
Andrew Whitaker, Marianne Shaw, and Steven D. Gribble. Scale and performance in the Denali isolation kernel. In Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI '02), pp. 195-210, Boston, MA, December 2002.
-
(2002)
Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI '02)
, pp. 195-210
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
|