-
2
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
Badger L, Sterne D, Sherman D, Walker K. Haghinghat S (1995) Practical domain and type enforcement for UNIX. Proceedings of the IEEE Symposium on Security and Privacy, pp 66-77
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.2
Sherman, D.3
Walker, K.4
Haghinghat, S.5
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
Technical report no MTR-2997. MITRE Corporation, Bedford, MA
-
Bell D, La Padula L (1975) Secure computer system: unified exposition and Multics interpretation. Technical report no MTR-2997. MITRE Corporation, Bedford, MA
-
(1975)
-
-
Bell, D.1
La Padula, L.2
-
5
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
Bershad B, Savage S, Pardyak P, Sirer E, Fiuczinski M, Becker D, Eggers S, Chambers C (1995) Extensibility, safety and performance in the SPIN operating system, Proceedings of the ACM Symposium on Operating System Principles (SOSP), pp 267-283
-
(1995)
Proceedings of the ACM Symposium on Operating System Principles (SOSP)
, pp. 267-283
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.4
Fiuczinski, M.5
Becker, D.6
Eggers, S.7
Chambers, C.8
-
6
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino E, Catania B, Ferrari E, Perlasca P (2003) A logical framework for reasoning about access control models. ACM Trans Inf Syst Secur 6(1):71-127
-
(2003)
ACM Trans Inf Syst Secur
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
7
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report no. MTR-3153. MITRE Corporation, Bedford, MA
-
Biba K (1977) Integrity considerations for secure computer systems. Technical Report no. MTR-3153. MITRE Corporation, Bedford, MA
-
(1977)
-
-
Biba, K.1
-
10
-
-
33748970808
-
The Fractal component model and its support in Java. Software-practice and experience (SP&E)
-
Bruneton E, Coupaye T, Leclerc M, Quema V, Stefani J-B (2006) The Fractal component model and its support in Java. Software-practice and experience (SP&E). Special issue on Experiences with Auto-adaptive and Reconfigurable Systems 36(11-12):1257-1284
-
(2006)
Special issue on Experiences with Auto-adaptive and Reconfigurable Systems
, vol.36
, Issue.11-12
, pp. 1257-1284
-
-
Bruneton, E.1
Coupaye, T.2
Leclerc, M.3
Quema, V.4
Stefani, J.-B.5
-
11
-
-
0037232265
-
Security in an autonomic computing environment
-
Chess D, Palmer C, White S (2003) Security in an autonomic computing environment. IBM Syst J 42(1):107-118
-
(2003)
IBM Syst J
, vol.42
, Issue.1
, pp. 107-118
-
-
Chess, D.1
Palmer, C.2
White, S.3
-
12
-
-
33845537277
-
Self-protection for distributed component-based applications. International Symposium on Stabilization, Safety, and Security of Distributed Systems
-
Claudel B, De Palma N, Lachaize R, Hagimont D (2006) Self-protection for distributed component-based applications. International Symposium on Stabilization, Safety, and Security of Distributed Systems, formerly Symposium on Self-stabilizing Systems (SSS), pp 184-198
-
(2006)
formerly Symposium on Self-stabilizing Systems (SSS)
, pp. 184-198
-
-
Claudel, B.1
De Palma, N.2
Lachaize, R.3
Hagimont, D.4
-
13
-
-
33847092871
-
GEO-RBAC: A spatially-aware RBAC
-
Damiani M, Bertino E, Catania B, Perlasca P (2007) GEO-RBAC: a spatially-aware RBAC. ACM Trans Inf Syst Secur 10(1):3-42
-
(2007)
ACM Trans Inf Syst Secur
, vol.10
, Issue.1
, pp. 3-42
-
-
Damiani, M.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
15
-
-
24644431553
-
Policies, models, and languages for access control
-
De Capitani Di Vimercati S, Samarati P, Jajodia S (2005) Policies, models, and languages for access control. Proceedings of the International Workshop on Databases in Networked Information Systems (DNIS), pp. 225-237
-
(2005)
Proceedings of the International Workshop on Databases in Networked Information Systems (DNIS)
, pp. 225-237
-
-
De Capitani Di Vimercati, S.1
Samarati, P.2
Jajodia, S.3
-
16
-
-
0000338326
-
Programming semantics for multi-programmed computations
-
Dennis JB, Van Horn E (1966) Programming semantics for multi-programmed computations. Commun ACM 9(3): 143-154
-
(1966)
Commun ACM
, vol.9
, Issue.3
, pp. 143-154
-
-
Dennis, J.B.1
Van Horn, E.2
-
19
-
-
60849124321
-
An access control system and method, a component-based kernel including it, and its use
-
US Patent Application no. 11,792,900
-
Fassino J-P, Jarboui T, Lacoste M (2008) An access control system and method, a component-based kernel including it, and its use. US Patent Application no. 11,792,900
-
(2008)
-
-
Fassino, J.-P.1
Jarboui, T.2
Lacoste, M.3
-
21
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo D, Sandhu R, Gavrila S, Kuhn D, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224-274
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
22
-
-
0037236308
-
The dawning of the autonomic computing era
-
Ganek A, Corbi T (2003) The dawning of the autonomic computing era. IBM Syst J 42(1):5-18
-
(2003)
IBM Syst J
, vol.42
, Issue.1
, pp. 5-18
-
-
Ganek, A.1
Corbi, T.2
-
23
-
-
2542610696
-
Terminal-centric view of software reconfigurable system architecture and enabling components and technologies
-
Georganopoulos N, Famham T, Burgess R, Scholer T, Sessler J, Warr P, Golubicic Z, Platbrood F, Souville B, Buljore S (2004) Terminal-centric view of software reconfigurable system architecture and enabling components and technologies. IEEE Commun Mag 42(5): 100-110
-
(2004)
IEEE Commun Mag
, vol.42
, Issue.5
, pp. 100-110
-
-
Georganopoulos, N.1
Famham, T.2
Burgess, R.3
Scholer, T.4
Sessler, J.5
Warr, P.6
Golubicic, Z.7
Platbrood, F.8
Souville, B.9
Buljore, S.10
-
25
-
-
0041865338
-
Separating access control policy enforcement and functionality in extensible systems
-
Grimm R, Bershad B (2001) Separating access control policy enforcement and functionality in extensible systems. ACM Trans Comput Syst 19(l):36-70
-
(2001)
ACM Trans Comput Syst
, vol.19
, Issue.L
, pp. 36-70
-
-
Grimm, R.1
Bershad, B.2
-
26
-
-
60849112916
-
ARM Dons Armor: TrustZone security extensions strengthen ARMv6 Architecture
-
August 25th
-
Halfhill T (2003) ARM Dons Armor: TrustZone security extensions strengthen ARMv6 Architecture. Microprocessor Report, August 25th
-
(2003)
Microprocessor Report
-
-
Halfhill, T.1
-
27
-
-
0007935332
-
The KeyKOS architecture
-
Hardy N (1985) The KeyKOS architecture. Oper Syst Rev 19(4):8-25
-
(1985)
Oper Syst Rev
, vol.19
, Issue.4
, pp. 8-25
-
-
Hardy, N.1
-
28
-
-
84871178505
-
-
Hewlett-Packard. Jena: a semantic web framework for Java, http:// jena.sourceforge.net/
-
Hewlett-Packard. Jena: a semantic web framework for Java, http:// jena.sourceforge.net/
-
-
-
-
31
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia S, Samarati P, Sapino M, Subrahmanian V (2001) Flexible support for multiple access control policies, ACM Trans Database Syst 26(2):214-260
-
(2001)
ACM Trans Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
34
-
-
0033684969
-
2K: A distributed operating system for dynamic heterogeneous environments
-
Kon F, Campbell R, Mickunas M, Nahrstedt K, Ballesteros F (2000) 2K: A distributed operating system for dynamic heterogeneous environments, IEEE International Symposium on High Performance Distributed Computing (HPDC), pp 201-210
-
(2000)
IEEE International Symposium on High Performance Distributed Computing (HPDC)
, pp. 201-210
-
-
Kon, F.1
Campbell, R.2
Mickunas, M.3
Nahrstedt, K.4
Ballesteros, F.5
-
35
-
-
34748925022
-
-
K42: building a complete operating system
-
Krieger O, Auslander M, Rosenburg B, Wisniewski R, Xenidis J, Da Silva D, Ostrowski M, Appavoo J, Butrico M, Mergen M, Waterland A, Uhlig V (2006) K42: building a complete operating system. Proceedings of the EUROSYS 2006 Conference, Operating Systems Review 40(4): 133-146
-
(2006)
Proceedings of the EUROSYS 2006 Conference, Operating Systems Review
, vol.40
, Issue.4
, pp. 133-146
-
-
Krieger, O.1
Auslander, M.2
Rosenburg, B.3
Wisniewski, R.4
Xenidis, J.5
Da Silva, D.6
Ostrowski, M.7
Appavoo, J.8
Butrico, M.9
Mergen, M.10
Waterland, A.11
Uhlig, V.12
-
36
-
-
84885608511
-
Make least privilege a right (not a privilege)
-
HotOS
-
Krohn M, Efstathopoulos P, Frey C, Kaashoek F, Kohler E, Mazieres D, Morris R, Osborne M, Vandebogart S, Ziegler D (2005) Make least privilege a right (not a privilege). Proceedings of the Hot Topics in Operating Systems Symposium (HotOS)
-
(2005)
Proceedings of the Hot Topics in Operating Systems Symposium
-
-
Krohn, M.1
Efstathopoulos, P.2
Frey, C.3
Kaashoek, F.4
Kohler, E.5
Mazieres, D.6
Morris, R.7
Osborne, M.8
Vandebogart, S.9
Ziegler, D.10
-
37
-
-
33847789626
-
CAmkES: A component model for secure microkernel-based embedded systems
-
Kuz T, Liu Y, Gorton I, Heiser G (2007) CAmkES: a component model for secure microkernel-based embedded systems. J Syst Softw 80(5):687-699
-
(2007)
J Syst Softw
, vol.80
, Issue.5
, pp. 687-699
-
-
Kuz, T.1
Liu, Y.2
Gorton, I.3
Heiser, G.4
-
41
-
-
33845221224
-
A policy flexible architecture for secure operating systems
-
Lin Z, Wang C, Mao B, Xie L (2005) A policy flexible architecture for secure operating systems. Oper Syst Rev 39(3):24-33
-
(2005)
Oper Syst Rev
, vol.39
, Issue.3
, pp. 24-33
-
-
Lin, Z.1
Wang, C.2
Mao, B.3
Xie, L.4
-
43
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Loscocco P, Smalley S, Muckelbauer P, Taylor R, Turner S, Farrell J (1998) The inevitability of failure: the flawed assumption of security in modern computing environments, Proceedings of the National Information Systems Security Conference, pp 303-314
-
(1998)
Proceedings of the National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.1
Smalley, S.2
Muckelbauer, P.3
Taylor, R.4
Turner, S.5
Farrell, J.6
-
44
-
-
85084163247
-
Providing policy control over object operations in a Mach-based system
-
Minear S (1995) Providing policy control over object operations in a Mach-based system. Proceedings of the USENIX Security Symposium, pp 141-156
-
(1995)
Proceedings of the USENIX Security Symposium
, pp. 141-156
-
-
Minear, S.1
-
46
-
-
77952342496
-
The rule set based access control (RSBAC) Linux kernel security extension
-
Ott A (2001) The rule set based access control (RSBAC) Linux kernel security extension. Proceedings of the International Linux Kongress
-
(2001)
Proceedings of the International Linux Kongress
-
-
Ott, A.1
-
47
-
-
3142523603
-
The UCON ABC usage control model
-
Park J, Sandhu R (2004) The UCON ABC usage control model. ACM Trans inf Syst Secur 7(1): 128-174
-
(2004)
ACM Trans inf Syst Secur
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
48
-
-
70249150944
-
Experience with implementing safe reconfigurations in component-based embedded systems
-
CBSE, pp
-
Polakovic J, Mazare S, Stefani J-B, David PC (2007) Experience with implementing safe reconfigurations in component-based embedded systems. Proceedings of the International ACM Symposium on Component-Based Software Engineering (CBSE), pp 240-255
-
(2007)
Proceedings of the International ACM Symposium on Component-Based Software Engineering
, pp. 240-255
-
-
Polakovic, J.1
Mazare, S.2
Stefani, J.-B.3
David, P.C.4
-
51
-
-
0003366960
-
Chorus distributed operating system
-
Rozier M, Abrossimov V, Armand F, Boule I, Gien M, Guillemont M, Hermann F, Kaiser C, Langlois S, Leonard P, Neuhauser W (1988) Chorus distributed operating system. Comput Syst 1 (4):305-370
-
(1988)
Comput Syst
, vol.1
, Issue.4
, pp. 305-370
-
-
Rozier, M.1
Abrossimov, V.2
Armand, F.3
Boule, I.4
Gien, M.5
Guillemont, M.6
Hermann, F.7
Kaiser, C.8
Langlois, S.9
Leonard, P.10
Neuhauser, W.11
-
52
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proceedings of the IEEE 63(9): 1278-1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
55
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
Seltzer M, Endo Y, Small C, Smith K (1996) Dealing with disaster: surviving misbehaved kernel extensions, Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSD1), pp 213-228
-
(1996)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSD1)
, pp. 213-228
-
-
Seltzer, M.1
Endo, Y.2
Small, C.3
Smith, K.4
-
56
-
-
0036147270
-
EROS: A principle-driven operating system from the ground up
-
Shapiro J, Hardy N (2002) EROS: a principle-driven operating system from the ground up. IEEE Softw 19(l):26-33
-
(2002)
IEEE Softw
, vol.19
, Issue.L
, pp. 26-33
-
-
Shapiro, J.1
Hardy, N.2
-
59
-
-
85084160641
-
The Flask security architecture: System support for diverse security policies
-
Spencer R, Smalley S, Loscocco P, Hibler M, Andersen D, Lepreau J (1999) The Flask security architecture: system support for diverse security policies. Proceedings of the USENIX Security Symposium
-
(1999)
Proceedings of the USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
60
-
-
51949087106
-
Secure architecture and implementation of Xen on ARM for mobile devices
-
April
-
Suh S (2007) Secure architecture and implementation of Xen on ARM for mobile devices. Xen Summit, April
-
(2007)
Xen Summit
-
-
Suh, S.1
-
64
-
-
37049002830
-
Labels and event processes in the Asbestos operating system
-
Vandebogart S, Efstathopouios P, Kohler E, Krohn M, Frey C, Ziegler D, Kaashoek F, Morris R, Mazieres D (2007) Labels and event processes in the Asbestos operating system. ACM Trans Comput Syst 25(4): 11.1-11.43
-
(2007)
ACM Trans Comput Syst
, vol.25
, Issue.4
-
-
Vandebogart, S.1
Efstathopouios, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazieres, D.9
|