-
1
-
-
0011730379
-
-
Accetta, M., Baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., Young, M. Mach: A New Kernel Foundation for UNIX Development. 1986, 93-112.
-
(1986)
A New Kernel Foundation for UNIX Development.
, pp. 93-112
-
-
Accetta, M.1
Baron, R.2
Bolosky, W.3
Golub, D.4
Rashid, R.5
Tevanian, A.6
MacH, Y.M.7
-
3
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L., Loeb, M., Zhou, L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comp. Secur. 11, 3 (2003), 431-448.
-
(2003)
J. Comp. Secur.
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
4
-
-
0023979646
-
The v distributed system
-
Cheriton, D.R. The V distributed system. Commun. ACM 31 (1988), 314-333.
-
(1988)
Commun. ACM
, vol.31
, pp. 314-333
-
-
Cheriton, D.R.1
-
5
-
-
0039952532
-
Defense-in-depth against computer viruses
-
Cohen, F.B. Defense-in-depth against computer viruses. Comp. Secur. 11, 6 (1993), 565-584.
-
(1993)
Comp. Secur.
, vol.11
, Issue.6
, pp. 565-584
-
-
Cohen, F.B.1
-
8
-
-
0003636516
-
-
Directorate for Command, Control, Communications and Computer systems, U.S. Department of defense Joint staff U.S. Department of defense Joint staff, Feb.
-
Directorate for Command, Control, Communications and Computer systems, U.S. Department of defense Joint staff. Information assurance through defense-in-depth. Technical report, directorate for Command, Control, Communications and Computer systems, U.S. Department of defense Joint staff, Feb. 2000.
-
(2000)
Information Assurance Through Defense-in-depth. Technical Report, Directorate for Command, Control, Communications and Computer Systems
-
-
-
9
-
-
78649997202
-
Leveraging legacy code to deploy desktop applications on the web
-
December
-
Douceur, J.R., Elson, J., Howell, J., Lorch, J.R. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of the 2008 Symposium on Operating System Design and Implementation (December 2008).
-
(2008)
Proceedings of the 2008 Symposium on Operating System Design and Implementation
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
11
-
-
85084162735
-
A secure enviroment for untrusted helper applications
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A. A secure enviroment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium (1996).
-
(1996)
Proceedings of the 6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
12
-
-
0038145552
-
UnIx as an application program
-
Golub, D., Dean, A., Forin, R., Rashid, R. UnIx as an application program. In Proceedings of the Summer 1990 USENIX Conference (1990), 87-95.
-
(1990)
Proceedings of the Summer 1990 USENIX Conference
, pp. 87-95
-
-
Golub, D.1
Dean, A.2
Forin, R.3
Rashid, R.4
-
13
-
-
70449656509
-
-
Computer Systems Research Group, University of California, Berkeley
-
Joy, W., Cooper, E., Fabry, R., Leffer, S., McKusick, K., Mosher, D. 4.2 bsd system manual. Technical report, Computer Systems Research Group, University of California, Berkeley, 1983.
-
(1983)
4.2 bsd System Manual. Technical report
-
-
Joy, W.1
Cooper, E.2
Fabry, R.3
Leffer, S.4
McKusick, K.5
Mosher, D.6
-
18
-
-
70449677049
-
-
Microsoft Corporation
-
Microsoft Corporation. Structured exception handling. http://msdn.microsoft.com/en-us/library/ms680657(vs.85).aspx, 2008.
-
(2008)
Structured Exception Handling
-
-
-
19
-
-
70449675366
-
-
Netscape Corporation
-
Netscape Corporation. Gecko plugin aPI reference. http://developer. mozilla.org/en/docs/Gecko-Plugin- aPI-reference.
-
Gecko Plugin API Reference
-
-
-
20
-
-
84878346861
-
Improving host security with system call policies
-
Aug.
-
Provos, N. Improving host security with system call policies. In USENIX Security Symposium (aug. 2003)
-
(2003)
USENIX Security Symposium
-
-
Provos, N.1
-
22
-
-
70449696422
-
Cost of computer viruses top $10 billion already this year
-
Aug.
-
Savage, M. Cost of computer viruses top $10 billion already this year. ChannelWeb, Aug. 2001.
-
(2001)
ChannelWeb
-
-
Savage, M.1
-
24
-
-
84875324617
-
The C++ programming language: Second edition
-
Stroustrup, B. The C++ Programming Language: Second Edition. Addison-Wesley, 1997.
-
(1997)
Addison-Wesley
-
-
Stroustrup, B.1
-
26
-
-
0003969633
-
-
U. S. Department of defense, Computer security Center Dec.
-
U. S. Department of defense, Computer security Center. Trusted computer system evaluation criteria, Dec. 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
27
-
-
0027836576
-
Effcient software-based fault isolation
-
dec.
-
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L. Effcient software-based fault isolation. ACM SIGOPS Oper. Sys. Rev. 27, 5 (dec. 1993), 203-216.
-
(1993)
ACM SIGOPS Oper. Sys. Rev.
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
|