-
1
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
Brighton, UK, October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris, "Labels and event processes in the Asbestos operating system," in Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Efstathopoulos, P.1
Krohn, M.2
Van De Bogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
2
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, Nov.
-
N. B. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières, "Making information flow explicit in HiStar," in Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA, Nov. 2006.
-
(2006)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Zeldovich, N.B.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
3
-
-
47149101814
-
Information flow control for standard OS abstractions
-
Stevenson, WA, October
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, "Information flow control for standard OS abstractions," in Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP)
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
4
-
-
0031543270
-
A decentralized model for information flow control
-
Saint-Malô, France, Oct.
-
A. C. Myers and B. Liskov, "A decentralized model for information flow control," in Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP), Saint-Malô, France, Oct. 1997, pp. 129-142.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
11
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
M. D. McIlroy and J. A. Reeds, "Multilevel security in the UNIX tradition," Software-Practice and Experience, vol.22, no.8, pp. 673-694, 1992.
-
(1992)
Software-practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning, "A lattice model of secure information flow," Communications of the ACM, vol.19, no.5, pp. 236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Oakland, CA, May
-
T. Fraser, "LOMAC: Low water-mark integrity protection for COTS environments," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000, pp. 230-245.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
14
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
MITRE Corparation, Bedford, MA, Rev. 1, March
-
D. E. Bell and L. J. LaPadula, "Secure computer system: Unified exposition and Multics interpretation," MITRE Corparation, Bedford, MA, Tech. Rep. MTR-2997, Rev. 1, March 1976.
-
(1976)
Tech. Rep. MTR-2997
-
-
Bell, D.E.1
LaPadula, L.J.2
-
15
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corp., Bedford, MA, Rev. 1
-
K. J. Biba, "Integrity considerations for secure computer systems," MITRE Corp., Bedford, MA, Tech. Rep. MTR-3153, Rev. 1, 1976.
-
(1976)
Tech. Rep. MTR-3153
-
-
Biba, K.J.1
-
16
-
-
0003843704
-
-
Englewood Cliffs, New Jersey: Prentice/Hall International
-
C. A. R. Hoare, Communicating Sequential Processes. Englewood Cliffs, New Jersey: Prentice/Hall International, 1985.
-
(1985)
Communicating Sequential Processes
-
-
Hoare, C.A.R.1
-
26
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
Copper Mountain Resort, Colorado, Dec.
-
D. R. Engler, M. F. Kaashoek, and J. O'Toole, "Exokernel: An operating system architecture for application-level resource management," in Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP), Copper Mountain Resort, Colorado, Dec. 1995, pp. 251-266.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 251-266
-
-
Engler, D.R.1
Kaashoek, M.F.2
O'Toole, J.3
-
27
-
-
21644479101
-
Transforming policies into mechanisms with infokernel
-
Bolton Landing, Lake George, New York, Oct.
-
A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau, N. C. Burnett, T. E. Denehy, T. J. Engle, H. S. Gunawi, J. A. Nugent, and F. I. Popovici, "Transforming policies into mechanisms with infokernel," in Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, Lake George, New York, Oct. 2003, pp. 90-105.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 90-105
-
-
Arpaci-Dusseau, A.C.1
Arpaci-Dusseau, R.H.2
Burnett, N.C.3
Denehy, T.E.4
Engle, T.J.5
Gunawi, H.S.6
Nugent, J.A.7
Popovici, F.I.8
-
28
-
-
35048891868
-
Keying hash functions for message authentication
-
Aug.
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), Aug. 1996, pp. 1-15.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
29
-
-
0003629990
-
-
FIPS 180-2, U.S. Department of Commerce/ N.I.S.T., National Technical Information Service, Springfield, VA, Aug.
-
FIPS 180-2, Secure Hash Standard, U.S. Department of Commerce/ N.I.S.T., National Technical Information Service, Springfield, VA, Aug. 2002.
-
(2002)
Secure Hash Standard
-
-
-
30
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Bedford, MA, Technical Report 2547, Mar.
-
D. E. Bell and L. J. LaPadula, "Secure computer systems: Mathematical foundations," MITRE Corparation, Bedford, MA, Tech. Rep. Technical Report 2547, Volume 1, Mar. 1973.
-
(1973)
MITRE Corparation, Tech. Rep.
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
32
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
San Diego, CA, June, FREENIX track
-
P. Loscocco and S. Smalley, "Integrating flexible support for security policies into the Linux operating system," in Proceedings of the 2001 USENIX Annual Technical Conference, San Diego, CA, June 2001, FREENIX track.
-
(2001)
Proceedings of the 2001 USENIX Annual Technical Conference
-
-
Loscocco, P.1
Smalley, S.2
-
34
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb.
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Network and Distributed System Security Symposium (NDSS), Feb. 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
36
-
-
0030370740
-
-
D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," vol.4, no.2-3, 1996, pp. 167-187.
-
(1996)
A Sound Type System for Secure Flow Analysis
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
38
-
-
37049026868
-
Run-time principals in information-flow type systems
-
S. Tse and S. Zdancewic, "Run-time principals in information-flow type systems," ACM Transactions on Programming Language Systems, vol.30, no.1, 2007.
-
ACM Transactions on Programming Language Systems
, vol.30
, Issue.1
, pp. 2007
-
-
Tse, S.1
Zdancewic, S.2
|