-
2
-
-
21644433634
-
Xen and the Art of Virtualization
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the Art of Virtualization. In Proc. Symposium on Operating System Principles. 2003.
-
Proc. Symposium on Operating System Principles. 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
10
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, May 1976: 236-243.
-
(1976)
Communications of the ACM
, pp. 236-243
-
-
Denning, D.E.1
-
23
-
-
50249133982
-
-
Microsoft Corporation. Microsoft Virtual PC. 2007. http://www.microsoft. com/windowsxp/virtualpc/
-
(2007)
Microsoft Virtual PC
-
-
-
25
-
-
33845953872
-
-
National Security Administration. Security-Enhanced Linux. 2007. http://www.nsa.gov/selinux/.
-
(2007)
Security-Enhanced Linux
-
-
-
27
-
-
77950591412
-
-
Novell Corporation. AppArmor. http://www.novell.com/linux/security/ apparmor/.
-
AppArmor
-
-
-
31
-
-
77954747528
-
-
Sysinternals. Rootkit Revealer. 2006. http://www.sysinternals.com/ Utilities/RootkitRevealer.
-
(2006)
Rootkit Revealer
-
-
-
32
-
-
85084160641
-
The FLASK Security Architecture: System Support for Diverse Security Policies
-
Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The FLASK Security Architecture: System Support for Diverse Security Policies. In Proc. USENIX Security Symposium. 1999.
-
Proc. USENIX Security Symposium. 1999
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
35
-
-
77950578684
-
-
Sun Microsystems. Java Security Overview. 2007. http://java.sun.com/ javase/6/docs/technotes/guides.
-
(2007)
Java Security Overview
-
-
-
38
-
-
77950575412
-
-
The Tripwire Project. Tripwire host-based IDS. 2007. http://sourceforge. net/projects/tripwire/.
-
(2007)
Tripwire Host-based IDS.
-
-
-
39
-
-
33748055425
-
Towards Reasonability Properties for Access Control Policy Languages
-
Michael C. Tschantz and Shriram Krishnamurthi. Towards Reasonability Properties for Access Control Policy Languages. In Proc. ACM SACMAT. 2006.
-
Proc. ACM SACMAT. 2006
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
41
-
-
77950567822
-
-
VMWare Corporation. VMWare. 2007. http://www.vmware.com.
-
(2007)
VMWare
-
-
-
44
-
-
77950551459
-
Securing the User Input Path on NGSCB Systems
-
David R. Wooten. Securing the User Input Path On NGSCB Systems. In Microsoft WinHEC. 2004. http://download.microsoft.com/download/1/8/f/18f8cee2- 0b64-41f2893da6f2295b40c8/TW04055-WINHEC2004.ppt.
-
Microsoft WinHEC. 2004
-
-
Wooten, D.R.1
-
45
-
-
85038810709
-
Taint-enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proc. USENIX Security Symposium. 2006.
-
Proc. USENIX Security Symposium. 2006
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|