-
1
-
-
85084161234
-
Mapbox: Using parameterized behavior classes to confine applications
-
Denver, CO, August
-
A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the USENIX Security Symposium, pages 1-17, Denver, CO, August 2000.
-
(2000)
Proceedings of the USENIX Security Symposium
, pp. 1-17
-
-
Acharya, A.1
Raje, M.2
-
5
-
-
85084161168
-
TRON: Process-Specific File Protection for the UNIX Operating System
-
A. Berman, V. Bourassa, and E. Selberg. TRON: Process-Specific File Protection for the UNIX Operating System. In Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995.
-
Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
8
-
-
1542697134
-
SubDomain: Parsimonious Security for Server Appliances
-
C. Cowan, S. Beattie, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Security for Server Appliances. In Proceedings of the 14th USENIX System Administration Conference (LISA 2000), Mar. 2000.
-
Proceedings of the 14th USENIX System Administration Conference (LISA 2000), Mar. 2000
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
11
-
-
0007935332
-
The KeyKOS architecture
-
October
-
N. Hardy. The KeyKOS architecture. In Operating Systems Review, pages 8-25, October 1985.
-
(1985)
Operating Systems Review
, pp. 8-25
-
-
Hardy, N.1
-
13
-
-
0034449536
-
Implementing a Distributed Firewall
-
November
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Implementing a Distributed Firewall. In Proceedings of Computer and Communications Security (CCS), pages 190-199, November 2000.
-
(2000)
Proceedings of Computer and Communications Security (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
14
-
-
84942257511
-
The STRONGMAN Architecture
-
IEEE Computer Society Press, April
-
A. D. Keromytis, S. Ioannidis, M. B. Greenwald, and J. M. Smith. The STRONGMAN Architecture. In DARPA Information Survivability Conference and Exposition (DISCEX III), pages 178-188. IEEE Computer Society Press, April 2003.
-
(2003)
DARPA Information Survivability Conference and Exposition (DISCEX III)
, pp. 178-188
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.B.3
Smith, J.M.4
-
15
-
-
84874904489
-
Automatic software distribution
-
Salt Lake City, UT, Summer
-
A. Koenig. Automatic software distribution. In USENIX Conference Proceedings, pages 312-322, Salt Lake City, UT, Summer 1984.
-
(1984)
USENIX Conference Proceedings
, pp. 312-322
-
-
Koenig, A.1
-
16
-
-
84984064460
-
Policy/mechanism separation in hydra
-
November
-
R. Levin, E. Cohen, W. Corwin, and W. Wulf. Policy/mechanism separation in hydra. In Proceedings of the 5th ACM Symposium on Operating Systems Principles, pages 132-140, November 1975.
-
(1975)
Proceedings of the 5th ACM Symposium on Operating Systems Principles
, pp. 132-140
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Wulf, W.4
-
20
-
-
0003143922
-
The flask security architecture: System support for diverse security policies
-
Denver, CO, August
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Anderson, and J. Lepreau. The flask security architecture: System support for diverse security policies. In Proceedings of the USENIX Security Symposium, pages 123-139, Denver, CO, August 2000.
-
(2000)
Proceedings of the USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
|