-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., and Neugebauer., R. (2003). Xen and the art of virtualization. Proc. ACM Symposium on Operating Systems Principles (SOSP).
-
(2003)
Proc. ACM Symposium on Operating Systems Principles (SOSP)
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
4
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
Brighton, United Kingdom
-
Efstathopoulos, P., Krohn, M., VanDeBogart, S., Frey, C., Ziegler, D., Kohier, E., Mazières, D., Kaashoek, F., and Morris, R. (2005). Labels and event processes in the asbestos operating system. Proc. 20th Symposium on Operating Systems Principles (SOSP), Brighton, United Kingdom.
-
(2005)
Proc. 20th Symposium on Operating Systems Principles (SOSP)
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohier, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
8
-
-
0003246945
-
Slic: An extensibility system for commodity operating systems
-
Ghormley, D., Rodrigues, S., Petrou, D., and Anderson., T. (1998). Slic: An extensibility system for commodity operating systems. USENIX 1998 Annual Technical Conference.
-
(1998)
USENIX 1998 Annual Technical Conference
-
-
Ghormley, D.1
Rodrigues, S.2
Petrou, D.3
Anderson, T.4
-
9
-
-
85084162735
-
A secure environment for untrusted helper applications - confining the wily hacker
-
San Jose, CA, USA
-
Goldberg, I., Wagner, IX, Thomas, R., and Brewer, E. (1996). A secure environment for untrusted helper applications - confining the wily hacker. Proc. 6th Usenix Security Symposium. San Jose, CA, USA.
-
(1996)
Proc. 6th Usenix Security Symposium
-
-
Goldberg, I.1
Wagner, I.X.2
Thomas, R.3
Brewer, E.4
-
10
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
Jam, K. and Sekar, R. (2000). User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. ISOC Network and Distributed System Security Symposium (NDSS). pp. 19-34.
-
(2000)
ISOC Network and Distributed System Security Symposium (NDSS)
, pp. 19-34
-
-
Jam, K.1
Sekar, R.2
-
12
-
-
84944734361
-
Isolated program execution: An application transparent approach for executing untrusted programs
-
Las Vegas, Nevada
-
Liang, Z., Venkatakrishnan, V., and Sekar, R. (2003). Isolated program execution: An application transparent approach for executing untrusted programs. 19th Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada.
-
(2003)
19th Annual Computer Security Applications Conference (ACSAC)
-
-
Liang, Z.1
Venkatakrishnan, V.2
Sekar, R.3
-
16
-
-
84878346861
-
Improving host security with system call policies
-
Provos, N. (2003). Improving host security with system call policies. Proc. 12th USENIX Security Symposium. pp. 257-272.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
17
-
-
35248856770
-
A secure and portable jailing system
-
Technical report IR-CS-025, Vrije Universiteit
-
van 't Noordende, G., Balogh, A., Hofman, R., Brazier, F, and Tanenbaum, A. (2006). A secure and portable jailing system. Technical report IR-CS-025, Vrije Universiteit.
-
(2006)
-
-
van 't Noordende, G.1
Balogh, A.2
Hofman, R.3
Brazier, F.4
Tanenbaum, A.5
-
18
-
-
0031542975
-
Extensible security architectures for java
-
Wallach, D., Balfanz, D., Dean, D., and Felten, E. (1997). Extensible security architectures for java. 16th ACM Symposium on Operating Systems Principles. pp. 116-128.
-
(1997)
16th ACM Symposium on Operating Systems Principles
, pp. 116-128
-
-
Wallach, D.1
Balfanz, D.2
Dean, D.3
Felten, E.4
|