-
3
-
-
0037995929
-
SETI@Home: An experiment in public-resource computing
-
D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer. SETI@Home: An experiment in public-resource computing. Communications of the ACM, 45(11):56-61, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.11
, pp. 56-61
-
-
Anderson, D.P.1
Cobb, J.2
Korpela, E.3
Lebofsky, M.4
Werthimer, D.5
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles, Oct. 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
39049088155
-
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical ReportESD-TR-75-306, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA, 1976.
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical ReportESD-TR-75-306, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA, 1976.
-
-
-
-
8
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Technical report, MITRE MTR-2997, March
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical report, MITRE MTR-2997, March 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
9
-
-
84910156435
-
-
S. Berger, R. Cáceres, K. Goldman, R. Sailer, and L. van Doom. vTPM: Virtualizing the Trusted Platform Module. In Proceedings of the USENIX Security Symposium, July 2006.
-
S. Berger, R. Cáceres, K. Goldman, R. Sailer, and L. van Doom. vTPM: Virtualizing the Trusted Platform Module. In Proceedings of the USENIX Security Symposium, July 2006.
-
-
-
-
10
-
-
39049101567
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust-management system, version 2. IETF RFC 2704, Sept. 1999
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust-management system, version 2. IETF RFC 2704, Sept. 1999.
-
-
-
-
13
-
-
0003593599
-
-
IETF RFC 2693, Sept
-
C. M. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. M. Thomas, and T. Ylonen. SPKI certificate theory. IETF RFC 2693, Sept. 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
14
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
I. Foster, C. Kesselman, and S. Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. Supercomputer Applications, 15(3), 2001.
-
(2001)
Supercomputer Applications
, vol.15
, Issue.3
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
15
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the ACM Symposium on Operating System Principles, October 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating System Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
17
-
-
33845931072
-
Leveraging IPSec for mandatory access control of linux network communications
-
Technical Report RC23642 W0506-109, IBM, June
-
T. R. Jaeger, S. Hallyn, and J. Latten. Leveraging IPSec for mandatory access control of linux network communications. Technical Report RC23642 (W0506-109), IBM, June 2005.
-
(2005)
-
-
Jaeger, T.R.1
Hallyn, S.2
Latten, J.3
-
18
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11):1147-1165, 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
22
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems (TOCS), 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems (TOCS)
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
23
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Feb
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
25
-
-
33751069196
-
NetTop: Commercial technology in high assurance applications
-
R. Meushaw and D. Simard. NetTop: Commercial technology in high assurance applications. Tech Trend Notes, 9(4): 1-8, 2000.
-
(2000)
Tech Trend Notes
, vol.9
, Issue.4
, pp. 1-8
-
-
Meushaw, R.1
Simard, D.2
-
27
-
-
0003665362
-
-
Open Software Foundation, Prentice Hall, Englewood Cliffs, NJ
-
Open Software Foundation. Introduction to OSF DCE. Prentice Hall, Englewood Cliffs, NJ, 1993.
-
(1993)
Introduction to OSF DCE
-
-
-
29
-
-
39049115603
-
Toward a high B level security architecture for the IBM ESZ3090 processor resource Z systems manager (PRZSM)
-
Oct
-
T. T. Russell and M. Schaefer. Toward a high B level security architecture for the IBM ESZ3090 processor resource Z systems manager (PRZSM). In Proceedings of the National Computer Security Conference, Oct. 1989.
-
(1989)
Proceedings of the National Computer Security Conference
-
-
Russell, T.T.1
Schaefer, M.2
-
30
-
-
33750248123
-
Building a MACbased security architecture for the Xen opensource hypervisor
-
Dec
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. Griffin, and L. van Doom. Building a MACbased security architecture for the Xen opensource hypervisor. In Proceedings of the Annual Computer Security Applications Conference, Dec. 2005.
-
(2005)
Proceedings of the Annual Computer Security Applications Conference
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
van Doom, L.8
-
34
-
-
2442534092
-
Implementing SELinux as a linux security module
-
Technical Report 01-043, NAI Labs
-
S. Smalley, C. Vance, and W. Salamon. Implementing SELinux as a linux security module. Technical Report 01-043, NAI Labs, 2001.
-
(2001)
-
-
Smalley, S.1
Vance, C.2
Salamon, W.3
-
38
-
-
84942318236
-
Security for grid services
-
June
-
V Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke. Security for grid services. In Proceedings of Symposium on High Performance Distributed Computing, June 2003.
-
(2003)
Proceedings of Symposium on High Performance Distributed Computing
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
39
-
-
85084164351
-
Linux Security Modules: General security support for the linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. KroahHartman. Linux Security Modules: General security support for the linux kernel. In Proceedings of the USENIX Security Symposium, 2002.
-
(2002)
Proceedings of the USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
KroahHartman, G.5
|