-
1
-
-
0030376097
-
Conspiracy and information flow in the take-grant protection model
-
Bishop, M.: Conspiracy and information flow in the take-grant protection model. Journal of Computer Security 4(4), 331-360 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.4
, pp. 331-360
-
-
Bishop, M.1
-
2
-
-
0018685670
-
The transfer of information and authority in a protection system
-
ACM Press, New York
-
Bishop, M., Snyder, L.: The transfer of information and authority in a protection system. In: 7th SOSP, pp. 45-54. ACM Press, New York (1979)
-
(1979)
7th SOSP
, pp. 45-54
-
-
Bishop, M.1
Snyder, L.2
-
3
-
-
57049118010
-
-
Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Munoz, C., Ait, O. (eds.) TPHOLs 2008. LNCS 5170 (to appear, 2008)
-
Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Munoz, C., Ait, O. (eds.) TPHOLs 2008. LNCS 5170 (to appear, 2008)
-
-
-
-
4
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. CACM 9, 143-155 (1966)
-
(1966)
CACM
, vol.9
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
5
-
-
33750992489
-
Running the manual: An approach to high-assurance microkernel development
-
Portland, OR, USA September
-
Derrin, P., Elphinstone, K., Klein, G., Cock, D., Chakravarty, M.M.T.: Running the manual: An approach to high-assurance microkernel development. In: ACM SIGPLAN Haskell WS, Portland, OR, USA (September 2006)
-
(2006)
ACM SIGPLAN Haskell WS
-
-
Derrin, P.1
Elphinstone, K.2
Klein, G.3
Cock, D.4
Chakravarty, M.M.T.5
-
6
-
-
70350589302
-
-
Elkaduwe, D., Derrin, P., Elphinstone, K.: A memory allocation model for an embedded microkernel. In: Proc. 1st MicroKernels for Embedded Systems, Sydney, Australia, pp. 28-34. NICTA (January 2007)
-
Elkaduwe, D., Derrin, P., Elphinstone, K.: A memory allocation model for an embedded microkernel. In: Proc. 1st MicroKernels for Embedded Systems, Sydney, Australia, pp. 28-34. NICTA (January 2007)
-
-
-
-
7
-
-
77958184237
-
Towards a practical, verified kernel
-
San Diego, CA, USA May
-
Elphinstone, K., Klein, G., Derrin, P., Roscoe, T., Heiser, G.: Towards a practical, verified kernel. In: 11th HotOS, San Diego, CA, USA (May 2007)
-
(2007)
11th HotOS
-
-
Elphinstone, K.1
Klein, G.2
Derrin, P.3
Roscoe, T.4
Heiser, G.5
-
8
-
-
70350594176
-
-
Elphinstone, K., Klein, G., Kolanski, R.: Formalising a high-performance microkernel. In: Leino, R. (ed.) Workshop on Verified Software: Theories, Tools, and Experiments (VSTTE 2006), Microsoft Research Technical Report MSR-TR-2006-117, pp. 1-7, Seattle, USA (August 2006)
-
Elphinstone, K., Klein, G., Kolanski, R.: Formalising a high-performance microkernel. In: Leino, R. (ed.) Workshop on Verified Software: Theories, Tools, and Experiments (VSTTE 2006), Microsoft Research Technical Report MSR-TR-2006-117, pp. 1-7, Seattle, USA (August 2006)
-
-
-
-
9
-
-
0007935332
-
KeyKOS architecture
-
Hardy, N.: KeyKOS architecture. Operat. Syst. Rev. 19(4), 8-25 (1985)
-
(1985)
Operat. Syst. Rev
, vol.19
, Issue.4
, pp. 8-25
-
-
Hardy, N.1
-
10
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. In: CACM, pp. 561-471 (1976)
-
(1976)
CACM
, pp. 561-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
56349105212
-
Wombat: A portable user-mode Linux for embedded systems
-
Canberra April
-
Leslie, B., van Schaik, C., Heiser, G.: Wombat: A portable user-mode Linux for embedded systems. In: 6th Linux.Conf.Au, Canberra (April 2005)
-
(2005)
6th Linux.Conf.Au
-
-
Leslie, B.1
van Schaik, C.2
Heiser, G.3
-
12
-
-
84883516955
-
On μ-kernel construction
-
Copper Mountain, CO, USA, pp, December
-
Liedtke, J.: On μ-kernel construction. In: 15th SOSP, Copper Mountain, CO, USA, pp. 237-250 (December 1995)
-
(1995)
15th SOSP
, pp. 237-250
-
-
Liedtke, J.1
-
13
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24(3), 455-464 (1977)
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
15
-
-
70350602735
-
-
Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, 2283. Springer, Heidelberg (2002)
-
Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, vol. 2283. Springer, Heidelberg (2002)
-
-
-
-
17
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Technical report December
-
Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical report (December 1992), http://www.csl.sri.com/papers/csl- 92-2/
-
(1992)
, pp. 92-92
-
-
Rushby, J.1
-
18
-
-
33646747385
-
The practical application of a decidable access model
-
Technical Report SRL-2003-04, SRL, Baltimore, MD 21218 November
-
Shapiro, J.S.: The practical application of a decidable access model. Technical Report SRL-2003-04, SRL, Baltimore, MD 21218 (November 2003)
-
(2003)
-
-
Shapiro, J.S.1
-
19
-
-
0001421170
-
EROS: A fast capability system
-
Charleston, SC, USA, pp, December
-
Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: A fast capability system. In: 17th SOSP, Charleston, SC, USA, pp. 170-185 (December 1999)
-
(1999)
17th SOSP
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
20
-
-
0019713652
-
Theft and conspiracy in the Take-Grant protection model
-
Snyder, L.: Theft and conspiracy in the Take-Grant protection model. Journal of Computer and System Sciences 23(3), 333-347 (1981)
-
(1981)
Journal of Computer and System Sciences
, vol.23
, Issue.3
, pp. 333-347
-
-
Snyder, L.1
|