-
1
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA, ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
3
-
-
33745593513
-
The Insider Problem Revisited
-
Lake Arrowhead, CA, USA, Sept. ACM Press
-
M. Bishop. The Insider Problem Revisited. In Proc. of New Security Paradigms Workshop 2005, Lake Arrowhead, CA, USA, Sept. 2005. ACM Press.
-
(2005)
Proc. of New Security Paradigms Workshop 2005
-
-
Bishop, M.1
-
4
-
-
38149079272
-
-
R. C. Brackney and R. H. Anderson, editors. RAND Corporation, Santa Monica, CA, U.S.A., March
-
R. C. Brackney and R. H. Anderson, editors. Understanding the Insider Threat. RAND Corporation, Santa Monica, CA, U.S.A., March 2005.
-
(2005)
Understanding the Insider Threat
-
-
-
5
-
-
27544447707
-
Towards a theory of insider threat assessment
-
IEEE Computer Society
-
R. Chinchani, A. Iyer, H. Q. Ngo, and S. Upadhyaya. Towards a theory of insider threat assessment. In Proceedings of the 2005 International Conference on Dependable Systems and Networks, pages 108-117. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 2005 International Conference on Dependable Systems and Networks
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
6
-
-
28144458511
-
Language-Based Information Erasure
-
Washington, DC, USA, IEEE Computer Society
-
S. Chong and A. C. Myers. Language-Based Information Erasure. In CSFW '05: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05), pages 241-254, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
CSFW '05: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05)
, pp. 241-254
-
-
Chong, S.1
Myers, A.C.2
-
9
-
-
77950885806
-
-
T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors. Springer
-
T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors. Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, volume 4691 of Lecture Notes in Computer Science. Springer, 2007.
-
(2007)
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, Volume 4691 of Lecture Notes in Computer Science
-
-
-
10
-
-
0006057299
-
Formalising fault trees
-
F. Redmill and T. Anderson, editors, Brighton, Springer
-
J. Gorski and A. Wardzinski. Formalising fault trees. In F. Redmill and T. Anderson, editors, Achievement and Assurance of Safety: Proceedings of the 3rd Safety-critical Systems Symposium, pages 311-328, Brighton, 1995. Springer.
-
(1995)
Achievement and Assurance of Safety: Proceedings of the 3rd Safety-critical Systems Symposium
, pp. 311-328
-
-
Gorski, J.1
Wardzinski, A.2
-
14
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
ACM, editor, ACM SIGPLAN Notices, New York, NY, USA, ACM Press
-
A. C. Myers. JFlow: practical mostly-static information flow control. In ACM, editor, POPL '99. Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of programming languages, January 20-22, 1999, San Antonio, TX, ACM SIGPLAN Notices, pages 228-241, New York, NY, USA, 1999. ACM Press.
-
(1999)
POPL '99. Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of Programming Languages, January 20-22, 1999, San Antonio, TX
, pp. 228-241
-
-
Myers, A.C.1
-
16
-
-
0000372791
-
KLAIM: A Kernel Language for Agents Interaction and Mobility
-
May
-
R. D. Nicola, G. Ferrari, and R. Pugliese. KLAIM: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315-330, May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
Nicola, R.D.1
Ferrari, G.2
Pugliese, R.3
-
18
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
R. Ortalo, Y. Deswarte, and M. Kaâniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
24
-
-
84896257180
-
MOVE: An end-to-end solution to network denial of service
-
A. Stavrou, A. D. Keromytis, J. Nieh, V. Misra, and D. Rubenstein. MOVE: An end-to-end solution to network denial of service. In Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS), pages 81-96, 2005.
-
(2005)
Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS)
, pp. 81-96
-
-
Stavrou, A.1
Keromytis, A.D.2
Nieh, J.3
Misra, V.4
Rubenstein, D.5
-
26
-
-
77950891907
-
-
Available from last visited April 9
-
Wikipedia. Moscow-washington hotline. Available from http://en.wikipedia. org/wiki/ Moscow-Washington-hotline, last visited April 9, 2008.
-
(2008)
Moscow-washington Hotline
-
-
-
27
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
G. Ganger, editor, New York, Oct. 21-24 ACM Press
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In G. Ganger, editor, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP-01), volume 35, 5 of ACM SIGOPS Operating Systems Review, pages 1-14, New York, Oct. 21-24 2001. ACM Press.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP-01), Volume 35, 5 of ACM SIGOPS Operating Systems Review
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
28
-
-
0037974191
-
Secure program partitioning
-
Aug.
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Secure program partitioning. ACM Transactions on Computer Systems, 20(3):283-328, Aug. 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|