-
1
-
-
5444269374
-
The Apache HTTP Server Project
-
APACHE. The Apache HTTP Server Project, http://httpd.apache.org.
-
-
-
APACHE1
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
Tech. Rep. MTR-2997, Rev. 1, MITRE Corp, Bedford, MA
-
BELL, D. E. AND LA PADULA, L. 1976. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA.
-
(1976)
-
-
BELL, D.E.1
LA PADULA, L.2
-
5
-
-
0024663398
-
Access mediation in a message passing kernel
-
Oakland, CA
-
BRANSTAD, M., TAJALLI, H., MAYER, F., AND DALVA, D. 1989. Access mediation in a message passing kernel. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 66-72.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 66-72
-
-
BRANSTAD, M.1
TAJALLI, H.2
MAYER, F.3
DALVA, D.4
-
6
-
-
0023979646
-
The V distributed system
-
CHERITON, D. R. 1988. The V distributed system. J. ACM 31, 3, 314-33.
-
(1988)
J. ACM
, vol.31
, Issue.3
, pp. 314-333
-
-
CHERITON, D.R.1
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 5, 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
DENNING, D.E.1
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
DENNING, D. E. AND DENNING, P. J. 1977. Certification of programs for secure information flow. Commun. ACM 20, 7, 504-513.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
DENNING, D.E.1
DENNING, P.J.2
-
9
-
-
37048998640
-
Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense
-
DEPARTMENT OF DEFENSE
-
DEPARTMENT OF DEFENSE. 1985. Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense. DoD 5200.28-STD.
-
(1985)
DoD 5200.28-STD
-
-
-
11
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
Brighton, England
-
EFSTATHOPOULOS, P., KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D., KOHLER, E., MAZIÈRES, D., KAASHOEK, F., AND MORRIS, R. 2005. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles. Brighton, England.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
EFSTATHOPOULOS, P.1
KROHN, M.2
VANDEBOGART, S.3
FREY, C.4
ZIEGLER, D.5
KOHLER, E.6
MAZIÈRES, D.7
KAASHOEK, F.8
MORRIS, R.9
-
12
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Oakland, CA
-
FRASER, T. 2000. LOMAC: Low water-mark integrity protection for COTS environments. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 230-245.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
FRASER, T.1
-
14
-
-
0024089972
-
The confused deputy (or why capabilities might have been invented)
-
HARDY, N. 1988. The confused deputy (or why capabilities might have been invented). Operat. Syst. Rev. 22, 4, 36-38.
-
(1988)
Operat. Syst. Rev
, vol.22
, Issue.4
, pp. 36-38
-
-
HARDY, N.1
-
16
-
-
85013593271
-
Flexible control of downloaded executable content
-
JAEGER, T., PRAKASH, A., LIEDTKE, J., AND ISLAM, N. 1999. Flexible control of downloaded executable content. ACM Trans. Inform. Syst. Secur. 2, 2, 177-228.
-
(1999)
ACM Trans. Inform. Syst. Secur
, vol.2
, Issue.2
, pp. 177-228
-
-
JAEGER, T.1
PRAKASH, A.2
LIEDTKE, J.3
ISLAM, N.4
-
18
-
-
0021197579
-
An augmented capability architecture to support lattice security and traceability of access
-
Oakland, CA
-
KARGER, P. A. AND HERBERT, A. J. 1984. An augmented capability architecture to support lattice security and traceability of access. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 2-12.
-
(1984)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-12
-
-
KARGER, P.A.1
HERBERT, A.J.2
-
19
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
Oakland, CA
-
KARGER, P. A., ZURKO, M. E., BONIN, D. W., MASON, A. H., AND KAHN, C. E. 1990. A VMM security kernel for the VAX architecture. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 2-19.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-19
-
-
KARGER, P.A.1
ZURKO, M.E.2
BONIN, D.W.3
MASON, A.H.4
KAHN, C.E.5
-
20
-
-
37049003626
-
-
KEY LOGIC. 1989. The KeyKOS/KeySAFE system design. Key Logic. Tech. Rep. SEC009-01. http://www.cis.upemi.edu/~KeyKOS/.
-
KEY LOGIC. 1989. The KeyKOS/KeySAFE system design. Key Logic. Tech. Rep. SEC009-01. http://www.cis.upemi.edu/~KeyKOS/.
-
-
-
-
22
-
-
33845403940
-
Building secure high-performance web services with OKWS
-
Boston, MA
-
KROHN, M. 2004. Building secure high-performance web services with OKWS. In Proceedings of the USENIX Annual Technical Conference. Boston, MA, 185-198.
-
(2004)
Proceedings of the USENIX Annual Technical Conference
, pp. 185-198
-
-
KROHN, M.1
-
23
-
-
84885608511
-
-
KROHN, M., EFSTATHOPOULOS, P., FREY, C., KAASHOEK, F., KOHLER, E., MAZIÈRES, D., MORRIS, R., OSBORNE, M., VANDEB OGART, S., AND ZIEGLER, D. 2005. Make least privilege a right (not a privilege). In Proceedings of the 10th Hot Topics in Operating Systems Symposium (HotOS-X). Santa Fe, NM.
-
KROHN, M., EFSTATHOPOULOS, P., FREY, C., KAASHOEK, F., KOHLER, E., MAZIÈRES, D., MORRIS, R., OSBORNE, M., VANDEB OGART, S., AND ZIEGLER, D. 2005. Make least privilege a right (not a privilege). In Proceedings of the 10th Hot Topics in Operating Systems Symposium (HotOS-X). Santa Fe, NM.
-
-
-
-
24
-
-
0019608720
-
-
LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
-
LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
-
-
-
-
28
-
-
85108103401
-
Design and implementation of the SELinux policy management server
-
Baltimore, MD
-
MACMILLAN, K., BRINDLE, J., MAYER, F., CAPLAN, D., AND TANG, J. 2006. Design and implementation of the SELinux policy management server. In Proceedings of the Security Enhanced Linux Symposium. Baltimore, MD.
-
(2006)
Proceedings of the Security Enhanced Linux Symposium
-
-
MACMILLAN, K.1
BRINDLE, J.2
MAYER, F.3
CAPLAN, D.4
TANG, J.5
-
29
-
-
0025022888
-
Beyond the pale of MAC and DAC - defining new forms of access control
-
Oakland, CA
-
MCCOLLUM, C. J., MESSING, J. R., AND NOTARGIACOMO, L. 1990. Beyond the pale of MAC and DAC - defining new forms of access control. In Proceedings of the IEEE Symposium, on Security and Privacy, Oakland, CA, 190-200.
-
(1990)
Proceedings of the IEEE Symposium, on Security and Privacy
, pp. 190-200
-
-
MCCOLLUM, C.J.1
MESSING, J.R.2
NOTARGIACOMO, L.3
-
30
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
MCILROY, M. D. AND REEDS, J. A. 1992. Multilevel security in the UNIX tradition. Softw. - Pract. Exper. 22, 8, 673-694.
-
(1992)
Softw. - Pract. Exper
, vol.22
, Issue.8
, pp. 673-694
-
-
MCILROY, M.D.1
REEDS, J.A.2
-
31
-
-
4043082675
-
An overview of the Spring system
-
MITCHELL, J. G., GIBBONS, J., HAMILTON, G., KESSLER, P. B., KHALIDI, Y. Y. A., KOUGIOURIS, P., MADANY, P., NELSON, M. N., POWELL, M. L., AND RADIA, S. R. 1994. An overview of the Spring system. In Proceedings of COMPCON 1994. 122-131.
-
(1994)
Proceedings of COMPCON 1994
, pp. 122-131
-
-
MITCHELL, J.G.1
GIBBONS, J.2
HAMILTON, G.3
KESSLER, P.B.4
KHALIDI, Y.Y.A.5
KOUGIOURIS, P.6
MADANY, P.7
NELSON, M.N.8
POWELL, M.L.9
RADIA, S.R.10
-
32
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
4 Oct
-
MYERS, A. C. AND LISKOV, B. 2000. Protecting privacy using the decentralized label model. ACM Trans. Comput. Syst. 9, 4 Oct., 410-442.
-
(2000)
ACM Trans. Comput. Syst
, vol.9
, pp. 410-442
-
-
MYERS, A.C.1
LISKOV, B.2
-
33
-
-
37049017902
-
-
NEWS10. 2005. Hacker accesses thousands of personal data files at CSU Chico, March 17, 2005. http ://www.news10.net/display_story.aspx?storyid= 9784.
-
NEWS10. 2005. Hacker accesses thousands of personal data files at CSU Chico, March 17, 2005. http ://www.news10.net/display_story.aspx?storyid= 9784.
-
-
-
-
34
-
-
85084160127
-
Flash: An efficient and portable Web server
-
Monterey, CA
-
PAI, V. S., DRUSCHEL, P., AND ZWAENEPOEL, W. 1999. Flash: An efficient and portable Web server. In Proceedings of the USENIX Annual Technical Conference. Monterey, CA, 199-212.
-
(1999)
Proceedings of the USENIX Annual Technical Conference
, pp. 199-212
-
-
PAI, V.S.1
DRUSCHEL, P.2
ZWAENEPOEL, W.3
-
35
-
-
0001300585
-
Plan 9 from Bell Labs
-
PIKE, R., PRESOTTO, D., DORWARD, S., FLANDRENA, B., THOMPSON, K., TRICKEY, H., AND WINTERBOTTOM, P. 1995. Plan 9 from Bell Labs. Comput. Syst. 8, 3, 221-254.
-
(1995)
Comput. Syst
, vol.8
, Issue.3
, pp. 221-254
-
-
PIKE, R.1
PRESOTTO, D.2
DORWARD, S.3
FLANDRENA, B.4
THOMPSON, K.5
TRICKEY, H.6
WINTERBOTTOM, P.7
-
37
-
-
0003366960
-
CHORUS distributed operating system
-
ROZIER, M., ABROSSIMOV, V., ARMAND, F., BOULE, I., GIEN, M., GUILLEMONT, M., HERRMANN, F., KAISER, C., LANGLOIS, S., LEONARD, P., AND NEUHAUSER, W. 1988. CHORUS distributed operating system. Comput. Syst. 1, 305-370.
-
(1988)
Comput. Syst
, vol.1
, pp. 305-370
-
-
ROZIER, M.1
ABROSSIMOV, V.2
ARMAND, F.3
BOULE, I.4
GIEN, M.5
GUILLEMONT, M.6
HERRMANN, F.7
KAISER, C.8
LANGLOIS, S.9
LEONARD, P.10
NEUHAUSER, W.11
-
38
-
-
0016555241
-
The protection of information in computer systems
-
SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9, 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
SALTZER, J.H.1
SCHROEDER, M.D.2
-
40
-
-
0036147270
-
EROS: A principle-driven operating system from the ground up
-
SHAPIRO, J. S. AND HARDY, N. 2002. EROS: A principle-driven operating system from the ground up. IEEE Softw. 19, 1, 26-33.
-
(2002)
IEEE Softw
, vol.19
, Issue.1
, pp. 26-33
-
-
SHAPIRO, J.S.1
HARDY, N.2
-
41
-
-
0001421170
-
EROS: A fast capability system
-
Kiawah Island, SC
-
SHAPIRO, J. S., SMITH, J. M., AND FARBER, D. J. 1999. EROS: A fast capability system. In Proceedings of the 17th ACM Symposium on Operating Systems Principles. Kiawah Island, SC, 170-185.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 170-185
-
-
SHAPIRO, J.S.1
SMITH, J.M.2
FARBER, D.J.3
-
42
-
-
84858511113
-
-
SQLITE, Version 3.2.1
-
SQLITE. http://www.sqlite.org. Version 3.2.1.
-
-
-
-
43
-
-
0025568729
-
-
TANENBAUM, A. S., VAN RENESSE, R., VAN STAVEREN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. 1990. Experiences with the Amoeba distributed operating system. Commun. ACM 33, 12, 46-63.
-
TANENBAUM, A. S., VAN RENESSE, R., VAN STAVEREN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. 1990. Experiences with the Amoeba distributed operating system. Commun. ACM 33, 12, 46-63.
-
-
-
-
44
-
-
84858496652
-
Major breach of UCLA's computer files
-
Dec. 12, 0 ,7111141.story
-
TROUNSON, R. 2006. Major breach of UCLA's computer files. Los Angeles Times, Dec. 12, 2006. http://www.latimes.com/news/local/la-me- ucla12dec12, 0 ,7111141.story.
-
(2006)
Los Angeles Times
-
-
TROUNSON, R.1
-
45
-
-
84858493778
-
VMware and the National Security Agency team to build advanced secure computer systems
-
VMWARE. 2000. VMware and the National Security Agency team to build advanced secure computer systems. Tech Trend Notes 9,4, 3-11. http://www.vmware.com/pdf/TechTrendNotes.pdf.
-
(2000)
Tech Trend Notes
, vol.9
, Issue.4
, pp. 3-11
-
-
VMWARE1
-
46
-
-
21644460050
-
-
VON BEHREN, R., CONDIT, J., ZHOU, F., NECULA, G. C., AND BREWER, E. 2003. Capriccio: Scalable threads for Internet services. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, Lake George, NY, 268-281.
-
VON BEHREN, R., CONDIT, J., ZHOU, F., NECULA, G. C., AND BREWER, E. 2003. Capriccio: Scalable threads for Internet services. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, Lake George, NY, 268-281.
-
-
-
-
47
-
-
33845440496
-
The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
-
San Antonio, TX
-
WATSON, R., MORRISON, W, VANCE, C., AND FELDMAN, B. 2003. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. In Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, 285-296.
-
(2003)
Proceedings of the USENIX Annual Technical Conference
, pp. 285-296
-
-
WATSON, R.1
MORRISON, W.2
VANCE, C.3
FELDMAN, B.4
-
48
-
-
84978438355
-
Scale and performance in the Denali isolation kernel
-
Boston, MA
-
WHITAKER, A., SHAW, M., AND GRIBBLE, S. D. 2002. Scale and performance in the Denali isolation kernel. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI '02). Boston, MA, 195-210.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI '02)
, pp. 195-210
-
-
WHITAKER, A.1
SHAW, M.2
GRIBBLE, S.D.3
-
49
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA
-
ZELDOVICH, N. B., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. 2006. Making information flow explicit in HiStar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06). Seattle, WA.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06)
-
-
ZELDOVICH, N.B.1
BOYD-WICKIZER, S.2
KOHLER, E.3
MAZIÈRES, D.4
|