-
1
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
Technical Report MTR-2997, Rev. 1, MITRE Corp, Bedford, MA, March
-
D. E. Bell and L. L. Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
(1976)
-
-
Bell, D.E.1
Padula, L.L.2
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report MTR-3153, Rev. 1, MITRE Corp, Bedford, MA
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Rev. 1, MITRE Corp., Bedford, MA, 1976.
-
(1976)
-
-
Biba, K.J.1
-
3
-
-
47149116213
-
Toward secure services from untrusted developers
-
Technical Report TR-2007-041, MIT CSAIL, Aug
-
M. Brodsky et al. Toward secure services from untrusted developers. Technical Report TR-2007-041, MIT CSAIL, Aug. 2007.
-
(2007)
-
-
Brodsky, M.1
-
4
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
Aug
-
S. Chong, K. Vikram, and A. C. Myers. SIF: Enforcing confidentiality and integrity in web applications. In Proc. 16th USENIX Security, Aug. 2007.
-
(2007)
Proc. 16th USENIX Security
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
5
-
-
47149094631
-
StackGuard: Automatic detection and prevention of buffer-overflow attacks
-
Aug
-
C. Cowan et al. StackGuard: Automatic detection and prevention of buffer-overflow attacks. In Proc. 11th USENIX Security, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security
-
-
Cowan, C.1
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proc. 2002 OSDI, Dec. 2002.
-
(2002)
Proc. 2002 OSDI
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
8
-
-
37049021655
-
Labels and event processes in the Asbestos operating system
-
October
-
P. Efstathopoulos et al. Labels and event processes in the Asbestos operating system. In Proc. 20th SOSP, October 2005.
-
(2005)
Proc. 20th SOSP
-
-
Efstathopoulos, P.1
-
9
-
-
85019186515
-
-
FastCGI
-
FastCGI. Open Market. http://www.fastcgi.com.
-
Open Market
-
-
-
10
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
May
-
T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In Proc. 2000 IEEE Security and Privacy, May 2000.
-
(2000)
Proc. 2000 IEEE Security and Privacy
-
-
Fraser, T.1
-
12
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
February
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Proc. 2004 NDSS, February 2004.
-
(2004)
Proc. 2004 NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
14
-
-
0015769027
-
Architecture of virtual machines
-
R. Goldberg. Architecture of virtual machines. In 1973 NCC AFIPS Conf. Proc., volume 42, pages 309-318, 1973.
-
(1973)
1973 NCC AFIPS Conf. Proc
, vol.42
, pp. 309-318
-
-
Goldberg, R.1
-
15
-
-
47149083633
-
Understanding practical application development in security-typed languages
-
December
-
B. Hicks, K. Ahmadizadeh, and P. McDaniel. Understanding practical application development in security-typed languages. In Proc. 22st ACSAC, December 2006.
-
(2006)
Proc. 22st ACSAC
-
-
Hicks, B.1
Ahmadizadeh, K.2
McDaniel, P.3
-
16
-
-
0037493434
-
Interposition agents: Transparently interposing user code at the system interface
-
Dec
-
M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Proc. 14th SOSP, Dec. 1993.
-
(1993)
Proc. 14th SOSP
-
-
Jones, M.B.1
-
20
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
June, FREENIX track
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. 2001 USENIX, June 2001. FREENIX track.
-
(2001)
Proc. 2001 USENIX
-
-
Loscocco, P.1
Smalley, S.2
-
22
-
-
47149088050
-
-
Dec. 2006
-
MoinMoin. The MoinMoin Wiki Engine, Dec. 2006. http://moinmoin. wikiwikiweb.de/.
-
The MoinMoin Wiki Engine
-
-
-
23
-
-
0002934582
-
A decentralized model for information flow control
-
Oct
-
A. C. Myers and B. Liskov. A decentralized model for information flow control. In Proc. 16th SOSP, Oct. 1997.
-
(1997)
Proc. 16th SOSP
-
-
Myers, A.C.1
Liskov, B.2
-
24
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Computer Systems, 9(4):410-442, October 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
25
-
-
84869671511
-
-
National Vulnerability Database
-
National Vulnerability Database. CVE-2007-2637. http://nvd.nist.gov/nvd. cfm?cvename=CVE-2007-2637.
-
, vol.CVE-2007-2637
-
-
-
26
-
-
70449734226
-
-
osvdb.org. Open Source Vulnerability Database. http://osvdb.org/searchdb. php?base=moinmoin.
-
osvdb.org. Open Source Vulnerability Database. http://osvdb.org/searchdb. php?base=moinmoin.
-
-
-
-
27
-
-
84878346861
-
Improving host security with system call policies
-
Aug
-
N. Provos. Improving host security with system call policies. In Proc. 12th USENIX Security, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security
-
-
Provos, N.1
-
28
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
32
-
-
85069458084
-
Splitting Interfaces: Making trust between applications and operating systems configurable
-
Nov
-
R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making trust between applications and operating systems configurable. In Proc. 2006 OSDI, Nov. 2006.
-
(2006)
Proc. 2006 OSDI
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
34
-
-
33845440496
-
The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
-
June
-
R. Watson, W. Morrison, C. Vance, and B. Feldman. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. In Proc. 2003 USENIX, June 2003.
-
(2003)
Proc. 2003 USENIX
-
-
Watson, R.1
Morrison, W.2
Vance, C.3
Feldman, B.4
-
35
-
-
1642406477
-
Scale and performance in the Denali isolation kernel
-
Dec
-
A. Whitaker, M. Shaw, and S. D. Gribble. Scale and performance in the Denali isolation kernel. In Proc. 2002 OSDI, Dec. 2002.
-
(2002)
Proc. 2002 OSDI
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
-
36
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
Aug
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In Proc. 11th USENIX Security, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|