-
3
-
-
14844332191
-
More enforceable security policies
-
Copenhagen, Denmark, July
-
L. Bauer, J. Ligatti, and D. Walker. More enforceable security policies. In Proceedings of the Workshop on Foundations of Computer Security (FCS'02), Copenhagen, Denmark, July 2002.
-
(2002)
Proceedings of the Workshop on Foundations of Computer Security (FCS'02)
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
84867854789
-
REMUS: A security-enhanced operating system
-
Feb.
-
M. Bernaschi, E. Gabrielli, and L. V. Mancini. REMUS: A security-enhanced operating system. ACM Transactions on Information and System Security, 5(1):36-61, Feb. 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 36-61
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
5
-
-
0003400255
-
Integrity considerations for secure computer systems
-
U. S. Air Force Electronic Systems Division
-
K. Biba. Integrity considerations for secure computer systems. Technical Report 76-372, U. S. Air Force Electronic Systems Division, 1977.
-
(1977)
Technical Report
, vol.76
, Issue.372
-
-
Biba, K.1
-
11
-
-
0032218233
-
History-based access control for mobile code
-
San Francisco, CA, USA
-
G. Edjladi, A. Acharya, and V. Chaudhary. History-based access control for mobile code. In Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
-
-
Edjladi, G.1
Acharya, A.2
Chaudhary, V.3
-
12
-
-
0037673305
-
Runtime verification of authorization hook placement for the Linux security modules framework
-
Washington, DC, Nov.
-
A. Edwards, T. Jaeger, and X. Zhang. Runtime verification of authorization hook placement for the Linux security modules framework. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 225-234, Washington, DC, Nov. 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 225-234
-
-
Edwards, A.1
Jaeger, T.2
Zhang, X.3
-
16
-
-
3543139162
-
Computability classes for enforcement mechanisms
-
Computer Science Department, Cornell University, Aug.
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. Technical Report TR 2003-1908, Computer Science Department, Cornell University, Aug. 2003.
-
(2003)
Technical Report
, vol.TR 2003-1908
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
27
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
Caledon Hills, Ontario, Canada, Sept.
-
Úlfar Erlingsson and F. B. Schneider. SASI enforcement of security policies: A retrospective. In Proceedings of the 1999 New Security Paradigms Workshop, pages 87-95, Caledon Hills, Ontario, Canada, Sept. 1999.
-
(1999)
Proceedings of the 1999 New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, Ú.1
Schneider, F.B.2
-
30
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
Oct.
-
D. S. Wallach, A. W. Appel, and E. W. Felten. SAFKASI: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341-378, Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
31
-
-
0036426315
-
Using reflection as a mechanism for enforcing security policies on compiled code
-
I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies on compiled code. Journal of Computer Security, 10(4):399-432, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.4
, pp. 399-432
-
-
Welch, I.1
Stroud, R.J.2
|