-
2
-
-
4243333157
-
-
Technical Report Purdue University, West Lafayette, IN, September
-
S. Adabala, A. R. Butt, R. J. Figueiredo, N. H. Kapadia, and J. A. B. Fortes. Security implications of making computing resources available via computational grids. Technical Report TR-ECE01-2, Purdue University, West Lafayette, IN, September 2001.
-
(2001)
Security Implications of Making Computing Resources Available Via Computational Grids
-
-
Adabala, S.1
Butt, A.R.2
Figueiredo, R.J.3
Kapadia, N.H.4
Fortes, J.A.B.5
-
3
-
-
0032131867
-
-
August
-
A. D. Alexandrov, M. Ibel, K. E. Schauser, and C. J. Scheiman. Ufo: A personal global file system based on user-level extensions to the operating system, volume 16, pages 207-233, August 1998.
-
(1998)
Ufo: A Personal Global File System Based on User-level Extensions to the Operating System
, vol.16
, pp. 207-233
-
-
Alexandrov, A.D.1
Ibel, M.2
Schauser, K.E.3
Scheiman, C.J.4
-
4
-
-
0003746421
-
-
Technical report, MRJ Technology Solutions, November
-
A. Bayucan, R. L. Henderson, C. Lesiak, B. Mann, T. Proett, and D. Tweten. Portable batch system: External reference specification. Technical report, MRJ Technology Solutions, November 1999.
-
(1999)
Portable Batch System: External Reference Specification
-
-
Bayucan, A.1
Henderson, R.L.2
Lesiak, C.3
Mann, B.4
Proett, T.5
Tweten, D.6
-
5
-
-
84966656634
-
-
Distributed Computing Technologies Inc. http://www.distributed.net
-
-
-
-
6
-
-
84966554951
-
-
Entropia Inc. http://www.entropia.com
-
-
-
-
8
-
-
84966470877
-
Tracing bsd system calls
-
03
-
S. E. Fagan. Tracing bsd system calls. Dr. Dobb's Journal, pages 38-43, 03 1998.
-
(1998)
Dr. Dobb's Journal
, pp. 38-43
-
-
Fagan, S.E.1
-
9
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120-128, 1996.
-
(1996)
Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
11
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
San Jose, Ca.
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the 6th Usenix Security Symposium, San Jose, Ca., 1996.
-
(1996)
Proceedings of the 6th Usenix Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
13
-
-
84966664677
-
White Paper: S/390 Virtual Image Facility for Linux
-
GC24-5930-03, February
-
IBM Corporation. White Paper: S/390 Virtual Image Facility for Linux, Guide and Reference. GC24-5930-03, February 2001.
-
(2001)
Guide and Reference
-
-
IBM Corporation1
-
14
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Symposium on Operating Systems Principles, pages 80-93, 1993.
-
(1993)
Symposium on Operating Systems Principles
, pp. 80-93
-
-
Jones, M.B.1
-
15
-
-
34247873749
-
Enhancing the scalability and usability of computational grids via logical user accounts and virtual file systems
-
April
-
N. H. Kapadia, R. J. Figueiredo, and J. A. B. Fortes. Enhancing the scalability and usability of computational grids via logical user accounts and virtual file systems. In Heterogeneous Computing Workshop at IPDPS, April 2001.
-
(2001)
Heterogeneous Computing Workshop at IPDPS
-
-
Kapadia, N.H.1
Figueiredo, R.J.2
Fortes, J.A.B.3
-
17
-
-
0030677523
-
Execution monitoring of security-critical programs in a distributed system: A specification-based approach
-
Oakland, California
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in a distributed system: A specification-based approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
18
-
-
0024138827
-
Condor - A hunter of idle workstations
-
Washington, DC
-
M. J. M. J. Litzkow, M. Livny, and M. W. Mutka. Condor - A hunter of idle workstations. In Proceedings of the 8th International Conference on Distributed Computing Systems (ICDCS), pages 104-111, Washington, DC, 1988.
-
(1988)
Proceedings of the 8th International Conference on Distributed Computing Systems (ICDCS)
, pp. 104-111
-
-
Litzkow, M.J.M.J.1
Livny, M.2
Mutka, M.W.3
-
19
-
-
0035354794
-
Playing inside the black box: Using dynamic instrumentation to create security holes
-
B. P. Miller, M. Christodorescu, R. Iverson, T. Kosar, A. Mirgorodskii, and F. Popovici. Playing inside the black box: Using dynamic instrumentation to create security holes. Parallel Processing Letters, 11(2,3):267-280, 2001.
-
(2001)
Parallel Processing Letters
, vol.11
, Issue.2-3
, pp. 267-280
-
-
Miller, B.P.1
Christodorescu, M.2
Iverson, R.3
Kosar, T.4
Mirgorodskii, A.5
Popovici, F.6
-
20
-
-
85084097858
-
Safe kernel extensions without run-time checking
-
October 28-31, Seattle, WA, Berkeley, CA, USA
-
G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. In USENIX, editor, 2nd Symposium on Operating Systems Design and Implementation (OSDI '96), October 28-31, 1996. Seattle, WA, pages 229-243, Berkeley, CA, USA, 1996.
-
(1996)
USENIX, Editor, 2nd Symposium on Operating Systems Design and Implementation (OSDI '96)
, pp. 229-243
-
-
Necula, G.C.1
Lee, P.2
-
22
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
25
-
-
0002717089
-
Mobile Agents and Security
-
Springer-Verlag, June
-
G. Vigna, editor. Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, June 1998.
-
(1998)
LNCS
, vol.1419
-
-
Vigna, G.1
-
29
-
-
0027836576
-
Software fault isolation
-
December
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Software fault isolation. In Fourteenth ACM Symposium on Operating System Principles, volume 27, pages 203-216, December 1993.
-
(1993)
Fourteenth ACM Symposium on Operating System Principles
, vol.27
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
|