-
1
-
-
85084161234
-
Mapbox: Using parame-terized behavior classes to confine applications
-
Denver, CO, Aug
-
A. Acharya and M. Raje, "Mapbox: Using parame-terized behavior classes to confine applications," in Proceedings of the 2000 USENIX Security Sympo-sium, pp. 1-17, Denver, CO, Aug. 2000.
-
(2000)
Proceedings of the 2000 USENIX Security Sympo-sium
, pp. 1-17
-
-
Acharya, A.1
Raje, M.2
-
2
-
-
1642387377
-
"Consh: A confined execution environment for internet com-putations
-
available at,Dec
-
A. Alexandrov, P. Kmiec, and K. Schauser, "Consh: A confined execution environment for internet com-putations," available at http://www.cs.ucsb.edu/,berto/papers/99-usenix-consh.ps, Dec. 1998.
-
(1998)
-
-
Alexandrov, A.1
Kmiec, P.2
Schauser, K.3
-
4
-
-
0032643221
-
Fir-mato: A novel firewall management toolkit
-
Y. Bartal, A. Mayer, K. Nissim, and A. Wool, "Fir-mato: A novel firewall management toolkit," in Pro-ceedings of IEEE Computer Society Symposium on Security and Privacy, pp. 17-31, 1999.
-
(1999)
Pro-ceedings of IEEE Computer Society Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
6
-
-
85084161168
-
TRON: Process-specific file protection for the UNIX oper-ating system
-
New Orleans, Louisiana, Jan
-
A. Berman, V. Bourassa, and E. Selberg, "TRON: Process-specific file protection for the UNIX oper-ating system," in Proceedings of the USENIX 1995 Technical Conference, pp. 165-175, New Orleans, Louisiana, Jan. 1995.
-
(1995)
Proceedings of the USENIX 1995 Technical Conference
, pp. 165-175
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
7
-
-
84982899264
-
The role of trust management in dis-tributed systems security
-
Springer-Verlag, New York, NY, USA
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The role of trust management in dis-tributed systems security," in Secure Internet Pro-gramming, LNCS 1603, pp. 185-210, Springer-Verlag, New York, NY, USA, 1999.
-
(1999)
Secure Internet Pro-gramming, LNCS 1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
8
-
-
0003226048
-
The KeyNote Trust Management System Version 2
-
Sep.
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, The KeyNote Trust Management System Version 2, RFC 2704, Sep. 1999.
-
(1999)
RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
9
-
-
0003437009
-
Firewalls and In-ternet Security: Repelling the Wily Hacker
-
W. R. Cheswick and S. M. Bellovin, Firewalls and In-ternet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.
-
(1994)
Addison-Wesley
-
-
Cheswick, W.R.1
Bellovin, S.M.2
-
10
-
-
1542697134
-
SubDomain: Parsimonious security for server appli-ances
-
Mar
-
C. Cowan, S. Beattie, C. Pu, P.Wagle, and V. Gligor, "SubDomain: Parsimonious security for server appli-ances," in Proceedings of the 14th USENIX System Administration Conference (LISA 2000), pp. 341-354, Mar. 2000.
-
(2000)
Proceedings of the 14th USENIX System Administration Conference (LISA 2000)
, pp. 341-354
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
13
-
-
0032641892
-
Hardening COTS software with generic software wrappers
-
Oakland, CA, May
-
T. Fraser, L. Badger, and M. Feldman, "Hardening COTS software with generic software wrappers," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 2-16, Oakland, CA, May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
14
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson, "SLIC: An extensibility system for commodity operating systems," in Proceedings of the 1998 USENIX Annual Technical Conference, pp. 39-52, June 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
15
-
-
85084162735
-
A secure environment for untrusted helper applications
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, "A secure environment for untrusted helper applications," in Procedings of the 1996 USENIX An-nual Technical Conference, pp. 1-13, 1996.
-
(1996)
Procedings of the 1996 USENIX An-nual Technical Conference
, pp. 1-13
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
17
-
-
0003518498
-
-
Addison Wesley, Reading
-
J. Gosling, B. Joy, and G. Steele, The Java Language Specification, Addison Wesley, Reading, 1996.
-
(1996)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
18
-
-
85034527162
-
Designing an academic firewall. Policy, practice and experience with SURF
-
Feb
-
M. Greenwald, S. K. Singhal, J. R. Stone, and D. R. Cheriton, "Designing an academic firewall. Policy, practice and experience with SURF," in Proceedings of Network and Distributed System Security Sympo-sium (NDSS), pp. 79-91, Feb. 1996.
-
(1996)
Proceedings of Network and Distributed System Security Sympo-sium (NDSS)
, pp. 79-91
-
-
Greenwald, M.1
Singhal, S.K.2
Stone, J.R.3
Cheriton, D.R.4
-
19
-
-
0007935332
-
The KeyKOS architecture
-
Oct
-
N. Hardy, "The KeyKOS architecture," in Operating Systems Review, pp. 8-25, Oct. 1985.
-
(1985)
Operating Systems Review
, pp. 8-25
-
-
Hardy, N.1
-
20
-
-
0033724294
-
Access control meets public key infras-tructure, or: Assigning roles to strangers
-
Apr
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid, "Access control meets public key infras-tructure, or: Assigning roles to strangers," in Pro-ceedings of IEEE Symposium on Security and Pri-vacy, pp. 2-14, Apr. 2000.
-
(2000)
Pro-ceedings of IEEE Symposium on Security and Pri-vacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
21
-
-
0004100755
-
PLAN: A Programming Language for Ac-tive Networks
-
Uni-versity of Pennsylvania, Feb
-
M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles, PLAN: A Programming Language for Ac-tive Networks, Technical Report MS-CIS-98-25, De-partment of Computer and Information Science, Uni-versity of Pennsylvania, Feb. 1998.
-
(1998)
Technical Report MS-CIS-98-25, De-partment of Computer and Information Science
-
-
Hicks, M.1
Kakkar, P.2
Moore, J.T.3
Gunter, C.A.4
Nettles, S.5
-
22
-
-
33645977900
-
Sub-operating systems: A new approach to application security
-
Sept
-
S. Ioannidis, S. Bellovin, and J. M. Smith, "Sub-operating systems: A new approach to application security," in Proceedings of 10th SIGOPS European Workshop, pp. 108-115, Sept. 2002.
-
(2002)
Proceedings of 10th SIGOPS European Workshop
, pp. 108-115
-
-
Ioannidis, S.1
Bellovin, S.2
Smith, J.M.3
-
23
-
-
0034449536
-
Implementing a distributed firewall
-
Nov. 2000
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, "Implementing a distributed firewall," in Proceedings of Computer and Communications Secu-rity (CCS) 2000, pp. 190-199, Nov. 2000.
-
(2000)
Proceedings of Computer and Communications Secu-rity (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
25
-
-
4544378423
-
Design and imple-mentation of virtual private services
-
Workshop on Enterprise Secu-rity, Special Session on Trust Management in Collab-orative Global Computing, June
-
S. Ioannidis, S. M. Bellovin, J. Ioannidis, A. D. Keromytis, and J. M. Smith, "Design and imple-mentation of virtual private services," in Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enter-prises (WETICE), Workshop on Enterprise Secu-rity, Special Session on Trust Management in Collab-orative Global Computing, pp. 269-274, June 2003.
-
(2003)
Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enter-prises (WETICE)
, pp. 269-274
-
-
Ioannidis, S.1
Bellovin, S.M.2
Ioannidis, J.3
Keromytis, A.D.4
Smith, J.M.5
-
26
-
-
84874904489
-
Automatic software distribution
-
Salt Lake City, UT, Summer
-
A. Koenig, "Automatic software distribution," in USENIX Conference Proceedings, pp. 312-322, Salt Lake City, UT, Summer 1984.
-
(1984)
USENIX Conference Proceedings
, pp. 312-322
-
-
Koenig, A.1
-
27
-
-
0038150463
-
Le système Caml Special Light: modules et compilation efficace en Caml
-
INRIA, Nov
-
X. Leroy, Le système Caml Special Light: modules et compilation efficace en Caml, Research report 2721, INRIA, Nov. 1995.
-
(1995)
Research report 2721
-
-
Leroy, X.1
-
28
-
-
84984064460
-
Pol-icy/mechanism separatino in hydra
-
Nov.
-
R. Levin, E. Cohen, W. Corwin, and W. Wulf, "Pol-icy/mechanism separatino in hydra," in Proceedings of the 5th ACM Symposium on Operating Systems Principles, pp. 132-140, Nov. 1975.
-
(1975)
Proceedings of the 5th ACM Symposium on Operating Systems Principles
, pp. 132-140
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Wulf, W.4
-
29
-
-
0342452552
-
The safe-tcl security model
-
New Orleans, Louisiana, June
-
J. Y. Levy, L. Demailly, J. K. Ousterhout, and B. B. Welch, "The safe-tcl security model, in USENIX 1998 Annual Technical Conference, pp. 217-229, New Orleans, Louisiana, June 1998.
-
(1998)
USENIX 1998 Annual Technical Conference
, pp. 217-229
-
-
Levy, J.Y.1
Demailly, L.2
Ousterhout, J.K.3
Welch, B.B.4
-
31
-
-
0036086451
-
Methods and lim-itations of security policy reconciliation
-
IEEE, Oakland, CA, May
-
P. McDaniel and A. Prakash, "Methods and lim-itations of security policy reconciliation, in 2002 IEEE Symposium on Security and Privacy, pp. 73-87, IEEE, Oakland, CA, May 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 73-87
-
-
McDaniel, P.1
Prakash, A.2
-
32
-
-
0003680553
-
Java Security: Hostile Applets
-
Wiley, New York, NY
-
G. McGraw and E. W. Felten, Java Security: Hostile Applets, Holes and Antidotes, Wiley, New York, NY, 1997.
-
(1997)
Holes and Antidotes
-
-
McGraw, G.1
Felten, E.W.2
-
33
-
-
84874853845
-
A net-work of firewalls: An implementation example
-
Dec
-
B. McKenney, D. Woycke, and W. Lazear, "A net-work of firewalls: An implementation example," in Proceedings of the 11th Anual Computer Security Ap-plications Conference (ACSAC), pp. 3-13, Dec. 1995.
-
(1995)
Proceedings of the 11th Anual Computer Security Ap-plications Conference (ACSAC)
, pp. 3-13
-
-
McKenney, B.1
Woycke, D.2
Lazear, W.3
-
34
-
-
0031332426
-
Using kernel hypervisors to secure applications
-
Dec
-
T. Mitchem, R. Lu, and R. O'Brien, "Using kernel hypervisors to secure applications," in Proceedings of the Annual Computer Security Applications Confer-ence, pp. 175-181, Dec. 1997.
-
(1997)
Proceedings of the Annual Computer Security Applications Confer-ence
, pp. 175-181
-
-
Mitchem, T.1
Lu, R.2
O'Brien, R.3
-
35
-
-
0005008274
-
Simple and flexible datagram access controls for UNIX-based gateways
-
J. C. Mogul, "Simple and flexible datagram access controls for UNIX-based gateways," in Proceedings of the USENIX Summer 1989 Conference, pp. 203-221, 1989.
-
(1989)
Proceedings of the USENIX Summer 1989 Conference
, pp. 203-221
-
-
Mogul, J.C.1
-
36
-
-
0001800257
-
Safe, untrusted agents us-ing proof-carrying code
-
G. C. Necula and P. Lee, "Safe, untrusted agents us-ing proof-carrying code," in Special Issue on Mobile Agents, LNCS 1419, pp. 61-91, 1998.
-
(1998)
Special Issue on Mobile Agents, LNCS 1419
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
39
-
-
85084160127
-
Flash: An efficient and portable Web server
-
Aug
-
V. S. Pai, P. Druschel, and W. Zwaenepoel, "Flash: An efficient and portable Web server, in Proceed-ings of the USENIX Annual Technical Conference, pp. 199-212, Aug. 1999.
-
(1999)
Proceed-ings of the USENIX Annual Technical Conference
, pp. 199-212
-
-
Pai, V.S.1
Druschel, P.2
Zwaenepoel, W.3
-
40
-
-
0022603643
-
Security in KeyKOS
-
Apr.
-
S. A. Rajunas, N. Hardy, A. C. Bomberger, W. S. Frantz, and C. R. Landau, "Security in KeyKOS," in Proceedings of the 1986 IEEE Symposium on Se-curity and Privacy, pp. 78-85, Apr. 1986.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Se-curity and Privacy
, pp. 78-85
-
-
Rajunas, S.A.1
Hardy, N.2
Bomberger, A.C.3
Frantz, W.S.4
Landau, C.R.5
-
41
-
-
0001421170
-
EROS: A fast capability system
-
J. S. Shapiro, J. M. Smith, and D. J. Farber, "EROS: A fast capability system," in Proceedings of the 17th ACM Symposium on Operating Systems Principles, pp. 170-185, 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
42
-
-
28444441823
-
Control-ling network communication with domain and type enforcement
-
Oct
-
D. L. Sherman, D. F. Sterne, L. Badger, S. L. Mur-phy, K. M. Walker, and S. A. Haghighat, "Control-ling network communication with domain and type enforcement," in Proceedings of the 18th National In-formation Systems Security Conference, pp. 211-220, Oct. 1995.
-
(1995)
Proceedings of the 18th National In-formation Systems Security Conference
, pp. 211-220
-
-
Sherman, D.L.1
Sterne, D.F.2
Badger, L.3
Mur-phy, S.L.4
Walker, K.M.5
Haghighat, S.A.6
-
43
-
-
0003143922
-
The flask security ar-chitecture: System support for diverse security poli-cies,
-
Denver, CO, Aug
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Anderson, and J. Lepreau, "The flask security ar-chitecture: System support for diverse security poli-cies," in Proceedings of the 2000 USENIX Security Symposium, pp. 123-139, Denver, CO, Aug. 2000.
-
(2000)
Proceedings of the 2000 USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
-
45
-
-
84874925030
-
-
The KeyKOS Operating System
-
The KeyKOS Operating System, http://www.cis.upenn.edu/~KeyKOS/.
-
-
-
-
46
-
-
84874888298
-
-
The OpenBSD Operating System
-
The OpenBSD Operating System, http://www.openbsd.org/.
-
-
-
-
47
-
-
2942654406
-
Certificate-based authorization policy in a PKI en-vironment
-
Nov
-
M. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a PKI en-vironment," ACM Transaction on Information and System Security, vol. 6, no. 4, pp. 566-588, Nov. 2003.
-
(2003)
ACM Transaction on Information and System Security
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
48
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
Aug
-
M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari, "Certificate-based access control for widely distributed resources," in Proceed-ings of the USENIX Security Symposium, pp. 215-228, Aug. 1999.
-
(1999)
Proceed-ings of the USENIX Security Symposium
, pp. 215-228
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
-
49
-
-
0001474969
-
Authorization policy in a PKI environ-ment
-
M. Thompson, S. Mudumbai, A. Essiari, and W. Chin, "Authorization policy in a PKI environ-ment,"in 1st Annual PKI Research Workshop, pp. 149-161, 2002.
-
(2002)
1st Annual PKI Research Workshop
, pp. 149-161
-
-
Thompson, M.1
Mudumbai, S.2
Essiari, A.3
Chin, W.4
-
50
-
-
0027836576
-
Efficient software-Based fault isolation
-
Dec.
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Gra-ham, "Efficient software-Based fault isolation," in Proceedings of the 14th ACM Symposium on Operat-ing Systems Principles, pp. 203-216, Dec. 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operat-ing Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Gra-ham, S.L.4
-
52
-
-
85084161648
-
Con-fining root programs with domain and type enforce-ment
-
July
-
K. M. Walker, D. F. Stern, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman, "Con-fining root programs with domain and type enforce-ment," in Proceedings of the 1996 USENIX Security Symposium, pp. 21-36, July 1996.
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
, pp. 21-36
-
-
Walker, K.M.1
Stern, D.F.2
Badger, L.3
Oosendorp, K.A.4
Petkac, M.J.5
Sherman, D.L.6
-
53
-
-
0031542975
-
Extensible security architectures for Java
-
Oct
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Fel-ten, "Extensible security architectures for Java," in Proceedings of the 16th ACM Symposium on Operat-ing Systems Principles, pp. 116-128, Oct. 1997.
-
(1997)
Proceedings of the 16th ACM Symposium on Operat-ing Systems Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Fel-ten, E.W.4
-
54
-
-
11244319622
-
Security policy reconciliation in distributed com-puting environments
-
H. B. Wang, S. Jha, P. D. McDaniel, and M. Livny, "Security policy reconciliation in distributed com-puting environments," in IEEE 5th International Workshop on Policies for Distributed Systems and Networks, pp. 137, 2004.
-
(2004)
IEEE 5th International Workshop on Policies for Distributed Systems and Networks
, pp. 137
-
-
Wang, H.B.1
Jha, S.2
McDaniel, P.D.3
Livny, M.4
|