-
1
-
-
85084161234
-
M A pbox: Using parameterized behavior classes to confine untrusted applications
-
URL Citations in this document: §2.5
-
Anurag Acharya, Mandar Raje, M A Pbox: using parameterized behavior classes to confine untrusted applications, 9th USENIX Security Symposium (2000). URL: http://www.usenix.org/publications/library/proceedings/sec2000/acharya. html. Citations in this document: §2.5.
-
(2000)
9th USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
2
-
-
85084162426
-
Security of web browser scripting languages: Vulnerabilities, attacks, and remedies
-
URL Citations in this document: §2.5
-
Vinod Anupam, Alain Mayer, Security of web browser scripting languages: vulnerabilities, attacks, and remedies, 7th USENIX Security Symposium (1998). URL: http://www.usenix.org/publications/library/proceedings/sec98/anupam.html. Citations in this document: §2.5.
-
(1998)
7th USENIX Security Symposium
-
-
Anupam, V.1
Mayer, A.2
-
3
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
URL Citations in this document: §2.5
-
M. Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat, A domain and type enforcement UNIX prototype, 5th USENIX Security Symposium (1995). URL: http://www.usenix.org/events/security95/badger. html. Citations in this document: §2.5.
-
(1995)
5th USENIX Security Symposium
-
-
Lee Badger, M.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
4
-
-
85175129789
-
-
posting to comp.security.unix, comp.mail.misc, comp.mail.sendmail URL Citations in this document: §1.1
-
Daniel J. Bernstein, Internet host SMTP server survey, posting to comp.security.unix, comp.mail.misc, comp.mail.sendmail (1996). URL: http://cr.yp.to/surveys/smtpsoftware.txt. Citations in this document: §1.1.
-
(1996)
Internet Host SMTP Server Survey
-
-
Bernstein, D.J.1
-
5
-
-
85175131181
-
-
URL Citations in this document: §3.3
-
Daniel J. Bernstein, Re: Logging question (1996). URL: http://www.ornl.gov/lists/mailing-lists/qmail/1996/12/msg00314.html. Citations in this document: §3.3.
-
(1996)
Re: Logging Question
-
-
Bernstein, D.J.1
-
6
-
-
33745965912
-
-
in [24] URL Citations in this document: §2.6
-
Daniel J. Bernstein, Curve25519: new Diffie-Hellman speed records, in [24] (2006), 207-228. URL: cr.yp.to/papers.html#curve25519. Citations in this document: §2.6.
-
(2006)
Curve25519: New Diffie-hellman Speed Records
, pp. 207-228
-
-
Bernstein, D.J.1
-
7
-
-
85175132255
-
-
Sams Publishing ISBN 978-0672319457. Citations in this document: §1.2
-
Richard Blum, Running qmail, Sams Publishing, 2000. ISBN 978-0672319457. Citations in this document: §1.2.
-
(2000)
Running Qmail
-
-
Blum, R.1
-
9
-
-
85175132492
-
Introducing a course on mathematical methodology
-
URL Citations in this document: §4
-
Edsger W. Dijkstra, Introducing a course on mathematical methodology, EWD962 (1986). URL: http://www.cs.utexas.edu/users/EWD/ewd09xx/EWD962.PDF. Citations in this document: §4.
-
(1986)
EWD962
-
-
Dijkstra, E.W.1
-
11
-
-
85084162735
-
A secure environment for untrusted helper applications (confining the wily hacker)
-
URL Citations in this document: §2.5, §2.5, §2.5, §2.5
-
Ian Goldberg, David Wagner, Randi Thomas, Eric Brewer, A secure environment for untrusted helper applications (confining the wily hacker), 6th USENIX Security Symposium (1996). URL: http://www.usenix.org/publications/ library/proceedings/sec96/goldberg.html. Citations in this document: §2.5, §2.5, §2.5, §2.5.
-
(1996)
6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
12
-
-
85175133758
-
-
URL Citations in this document: §2.3
-
Internet Security Systems, Remote Sendmail header processing vulnerability (2003). URL: http://www.iss.net/issEn/delivery/xforce/alertdetail. jsp?oid=21950. Citations in this document: §2.3.
-
(2003)
Remote Sendmail Header Processing Vulnerability
-
-
-
13
-
-
0016354647
-
Structured programming with go to statements
-
Citations in this document: §2.6
-
Donald Knuth, Structured programming with go to statements, Computing Surveys 6 (1974), 261-301. Citations in this document: §2.6.
-
(1974)
Computing Surveys
, vol.6
, pp. 261-301
-
-
Knuth, D.1
-
14
-
-
85175134147
-
-
ISBN 978-1565926288. Citations in this document: §1.2
-
John R. Levine, qmail, O'Reilly, 2004. ISBN 978-1565926288. Citations in this document: §1.2.
-
(2004)
Qmail, O'Reilly
-
-
Levine, J.R.1
-
15
-
-
85084164095
-
Expanding and extending the security features of java
-
URL Citations in this document: §2.5
-
Nimisha V. Mehta, Karen R. Sollins, Expanding and extending the security features of Java, 7th USENIX Security Symposium (1998). URL: http://www.usenix.org/publications/library/proceedings/sec98/mehta.html. Citations in this document: §2.5.
-
(1998)
7th USENIX Security Symposium
-
-
Mehta, N.V.1
Sollins, K.R.2
-
16
-
-
85084160542
-
A flexible containment mechanism for executing untrusted code
-
URL Citations in this document: §2.5
-
David S. Peterson, Matt Bishop, Raju Pandey, A flexible containment mechanism for executing untrusted code, 11th USENIX Security Symposium (2002). URL: http://www.usenix.org/events/sec02/peterson.html. Citations in this document: §2.5.
-
(2002)
11th USENIX Security Symposium
-
-
Peterson, D.S.1
Bishop, M.2
Pandey, R.3
-
17
-
-
0003975626
-
-
URL Citations in this document: §2.1
-
Eric Raymond, The cathedral and the bazaar (1997). URL: http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/. Citations in this document: §2.1.
-
(1997)
The Cathedral and the Bazaar
-
-
Raymond, E.1
-
18
-
-
0016555241
-
The protection of information in computer systems
-
Citations in this document: §2.5
-
Jerry H. Saltzer, Mike D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63 (1975), 1278-1308. Citations in this document: §2.5.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
URL Citations in this document: §3.3
-
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner, Detecting format string vulnerabilities with type qualifiers, 10th USENIX Security Symposium (2001). URL: http://www.usenix.org/publications/library/proceedings/ sec01/shankar.html. Citations in this document: §3.3.
-
(2001)
10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
20
-
-
85175134354
-
-
ISBN 978-1893115408. Citations in this document: §1.2
-
Dave Sill, The qmail handbook, Apress, 2002. ISBN 978-1893115408. Citations in this document: §1.2.
-
(2002)
The Qmail Handbook, Apress
-
-
Sill, D.1
-
21
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
URL Citations in this document: §2.5
-
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp, Confining root programs with domain and type enforcement, 6th USENIX Security Symposium (1996). URL: http://www.usenix.org/events/sec96/walker.html. Citations in this document: §2.5.
-
(1996)
6th USENIX Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Lee Badger, M.3
Petkac, M.J.4
Sherman, D.L.5
Oostendorp, K.A.6
-
23
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
URL Citations in this document: §2.5
-
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman, Linux security modules: general security support for the Linux kernel, 11th USENIX Security Symposium (2002). URL: http://www.usenix.org/ events/sec02/wright.html. Citations in this document: §2.5.
-
(2002)
11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
24
-
-
85175132849
-
-
New York, NY, USA, April 24-26 proceedings, Lecture Notes in Computer Science Springer, Berlin, 2006. ISBN 978-3-540-33851-2. See [6]
-
Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (editors), 9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24-26, 2006, proceedings, Lecture Notes in Computer Science, 3958, Springer, Berlin, 2006. ISBN 978-3-540-33851-2. See [6].
-
(2006)
9th International Conference on Theory and Practice in Public-key Cryptography
, pp. 3958
-
-
Yung, M.1
Dodis, Y.2
Kiayias, A.3
Malkin, T.4
|