-
2
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the Symposium on Operating Systems Principles (SOSP), October 2003.
-
(2003)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
3
-
-
0003400251
-
-
Technical Report ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, March
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, March 1976.
-
(1976)
Secure computer system: Unified exposition and Multics interpretation
-
-
Bell, D. E.1
LaPadula, L. J.2
-
4
-
-
0003400255
-
-
Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324)
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.).
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K. J.1
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.1
-
12
-
-
39049162501
-
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
-
Miami, FL, December 11-15
-
B. Hicks, K. Ahmadizadeh, and P. McDaniel. From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), Miami, FL, December 11-15 2006.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006)
-
-
Hicks, B.1
Ahmadizadeh, K.2
McDaniel, P.3
-
13
-
-
33745957768
-
Trusted declassification: High-level policy for a security-typed language
-
Ottawa, Canada, June 10 ACM Press
-
B. Hicks, D. King, P. McDaniel, and M. Hicks. Trusted declassification: High-level policy for a security-typed language. In Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS-06), Ottawa, Canada, June 10 2006. ACM Press.
-
(2006)
Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS-06)
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
Hicks, M.4
-
14
-
-
34548045083
-
A logical specification and analysis for SELinux MLS policy
-
Antipolis, France, June
-
Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel. A logical specification and analysis for SELinux MLS policy. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), Antipolis, France, June 2007.
-
(2007)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Hicks, Boniface1
Rueda, Sandra2
Clair, Luke St.3
Jaeger, Trent4
McDaniel, Patrick5
-
15
-
-
84968352943
-
Policy management using access control spaces
-
T. Jaeger, A. Edwards, and X. Zhang. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur., 6(3):327-364, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 327-364
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
16
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
L. Lam and T. Chiuch. A general dynamic information flow tracking framework for security applications. In Applied Computer Security Associates ACSAC, 2006.
-
(2006)
Applied Computer Security Associates ACSAC
-
-
Lam, L.1
Chiuch, T.2
-
18
-
-
84872691539
-
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs
-
H. Mantel and A. Sabelfeld. A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. Journal of Computer Security, 2002.
-
(2002)
Journal of Computer Security
-
-
Mantel, H.1
Sabelfeld, A.2
-
22
-
-
0004001006
-
-
Technical Report MIT/LCS/TR-783, Massachussetts Institute of Technology, January Ph.D. thesis
-
A. C. Myers. Mostly-Static Decentralized Information Flow Control. Technical Report MIT/LCS/TR-783, Massachussetts Institute of Technology, January 1999. Ph.D. thesis.
-
(1999)
Mostly-Static Decentralized Information Flow Control
-
-
Myers, A. C.1
-
29
-
-
85160764329
-
Embedded Java with GCJ
-
May
-
G. Sally. Embedded Java with GCJ. Linux Journal, (145), May 2006.
-
(2006)
Linux Journal
, Issue.145
-
-
Sally, G.1
-
31
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
San Diego, CA, USA, February
-
U. Shankar, T. Jaeger, and R. Sailer. Toward automated information-flow integrity verification for security-critical applications. In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS-06), San Diego, CA, USA, February 2006.
-
(2006)
Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS-06)
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
34
-
-
85084160641
-
The Flask architecture: System support for diverse security policies
-
August
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lapreau. The Flask architecture: System support for diverse security policies. In Proceedings of the 8th USENIX Security Symposium, pages 123-139, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lapreau, J.6
-
35
-
-
34548031091
-
Security-Enhanced Darwin: Porting SELinux to Mac OS X
-
Baltimore, MD, USA, March
-
Christopher Vance, Todd Miller, and Rob Dekelbaum. Security-Enhanced Darwin: Porting SELinux to Mac OS X. In Proceedings of the Third Annual Security Enhanced Linux Symposium, Baltimore, MD, USA, March 2007.
-
(2007)
Proceedings of the Third Annual Security Enhanced Linux Symposium
-
-
Vance, Christopher1
Miller, Todd2
Dekelbaum, Rob3
-
37
-
-
59449105095
-
Using Replication and Partitioning to Build Secure Distributed Systems
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using Replication and Partitioning to Build Secure Distributed Systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2003, pages 236-250, 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.2003
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A. C.3
Zdancewic, S.4
|