메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-10

Some thoughts on security after ten years of qmail 1.0

Author keywords

Eliminating bugs; Eliminating code; Eliminating trusted code

Indexed keywords

ELIMINATING BUG; ELIMINATING CODE; ELIMINATING TRUSTED CODE; INTERNET MAIL; MAIL TRANSFER AGENTS; SECURE PROGRAMMING;

EID: 79959561018     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314466.1314467     Document Type: Conference Paper
Times cited : (24)

References (24)
  • 1
    • 85084161234 scopus 로고    scopus 로고
    • M A pbox: Using parameterized behavior classes to confine untrusted applications
    • URL Citations in this document: §2.5
    • Anurag Acharya, Mandar Raje, M A Pbox: using parameterized behavior classes to confine untrusted applications, 9th USENIX Security Symposium (2000). URL: http://www.usenix.org/publications/library/proceedings/sec2000/acharya. html. Citations in this document: §2.5.
    • (2000) 9th USENIX Security Symposium
    • Acharya, A.1    Raje, M.2
  • 2
    • 85084162426 scopus 로고    scopus 로고
    • Security of web browser scripting languages: Vulnerabilities, attacks, and remedies
    • URL Citations in this document: §2.5
    • Vinod Anupam, Alain Mayer, Security of web browser scripting languages: vulnerabilities, attacks, and remedies, 7th USENIX Security Symposium (1998). URL: http://www.usenix.org/publications/library/proceedings/sec98/anupam.html. Citations in this document: §2.5.
    • (1998) 7th USENIX Security Symposium
    • Anupam, V.1    Mayer, A.2
  • 4
    • 85175129789 scopus 로고    scopus 로고
    • posting to comp.security.unix, comp.mail.misc, comp.mail.sendmail URL Citations in this document: §1.1
    • Daniel J. Bernstein, Internet host SMTP server survey, posting to comp.security.unix, comp.mail.misc, comp.mail.sendmail (1996). URL: http://cr.yp.to/surveys/smtpsoftware.txt. Citations in this document: §1.1.
    • (1996) Internet Host SMTP Server Survey
    • Bernstein, D.J.1
  • 5
    • 85175131181 scopus 로고    scopus 로고
    • URL Citations in this document: §3.3
    • Daniel J. Bernstein, Re: Logging question (1996). URL: http://www.ornl.gov/lists/mailing-lists/qmail/1996/12/msg00314.html. Citations in this document: §3.3.
    • (1996) Re: Logging Question
    • Bernstein, D.J.1
  • 6
    • 33745965912 scopus 로고    scopus 로고
    • in [24] URL Citations in this document: §2.6
    • Daniel J. Bernstein, Curve25519: new Diffie-Hellman speed records, in [24] (2006), 207-228. URL: cr.yp.to/papers.html#curve25519. Citations in this document: §2.6.
    • (2006) Curve25519: New Diffie-hellman Speed Records , pp. 207-228
    • Bernstein, D.J.1
  • 7
    • 85175132255 scopus 로고    scopus 로고
    • Sams Publishing ISBN 978-0672319457. Citations in this document: §1.2
    • Richard Blum, Running qmail, Sams Publishing, 2000. ISBN 978-0672319457. Citations in this document: §1.2.
    • (2000) Running Qmail
    • Blum, R.1
  • 9
    • 85175132492 scopus 로고
    • Introducing a course on mathematical methodology
    • URL Citations in this document: §4
    • Edsger W. Dijkstra, Introducing a course on mathematical methodology, EWD962 (1986). URL: http://www.cs.utexas.edu/users/EWD/ewd09xx/EWD962.PDF. Citations in this document: §4.
    • (1986) EWD962
    • Dijkstra, E.W.1
  • 11
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications (confining the wily hacker)
    • URL Citations in this document: §2.5, §2.5, §2.5, §2.5
    • Ian Goldberg, David Wagner, Randi Thomas, Eric Brewer, A secure environment for untrusted helper applications (confining the wily hacker), 6th USENIX Security Symposium (1996). URL: http://www.usenix.org/publications/ library/proceedings/sec96/goldberg.html. Citations in this document: §2.5, §2.5, §2.5, §2.5.
    • (1996) 6th USENIX Security Symposium
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.4
  • 12
    • 85175133758 scopus 로고    scopus 로고
    • URL Citations in this document: §2.3
    • Internet Security Systems, Remote Sendmail header processing vulnerability (2003). URL: http://www.iss.net/issEn/delivery/xforce/alertdetail. jsp?oid=21950. Citations in this document: §2.3.
    • (2003) Remote Sendmail Header Processing Vulnerability
  • 13
    • 0016354647 scopus 로고
    • Structured programming with go to statements
    • Citations in this document: §2.6
    • Donald Knuth, Structured programming with go to statements, Computing Surveys 6 (1974), 261-301. Citations in this document: §2.6.
    • (1974) Computing Surveys , vol.6 , pp. 261-301
    • Knuth, D.1
  • 14
    • 85175134147 scopus 로고    scopus 로고
    • ISBN 978-1565926288. Citations in this document: §1.2
    • John R. Levine, qmail, O'Reilly, 2004. ISBN 978-1565926288. Citations in this document: §1.2.
    • (2004) Qmail, O'Reilly
    • Levine, J.R.1
  • 15
    • 85084164095 scopus 로고    scopus 로고
    • Expanding and extending the security features of java
    • URL Citations in this document: §2.5
    • Nimisha V. Mehta, Karen R. Sollins, Expanding and extending the security features of Java, 7th USENIX Security Symposium (1998). URL: http://www.usenix.org/publications/library/proceedings/sec98/mehta.html. Citations in this document: §2.5.
    • (1998) 7th USENIX Security Symposium
    • Mehta, N.V.1    Sollins, K.R.2
  • 16
    • 85084160542 scopus 로고    scopus 로고
    • A flexible containment mechanism for executing untrusted code
    • URL Citations in this document: §2.5
    • David S. Peterson, Matt Bishop, Raju Pandey, A flexible containment mechanism for executing untrusted code, 11th USENIX Security Symposium (2002). URL: http://www.usenix.org/events/sec02/peterson.html. Citations in this document: §2.5.
    • (2002) 11th USENIX Security Symposium
    • Peterson, D.S.1    Bishop, M.2    Pandey, R.3
  • 17
    • 0003975626 scopus 로고    scopus 로고
    • URL Citations in this document: §2.1
    • Eric Raymond, The cathedral and the bazaar (1997). URL: http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/. Citations in this document: §2.1.
    • (1997) The Cathedral and the Bazaar
    • Raymond, E.1
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Citations in this document: §2.5
    • Jerry H. Saltzer, Mike D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63 (1975), 1278-1308. Citations in this document: §2.5.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 19
    • 85084164620 scopus 로고    scopus 로고
    • Detecting format string vulnerabilities with type qualifiers
    • URL Citations in this document: §3.3
    • Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner, Detecting format string vulnerabilities with type qualifiers, 10th USENIX Security Symposium (2001). URL: http://www.usenix.org/publications/library/proceedings/ sec01/shankar.html. Citations in this document: §3.3.
    • (2001) 10th USENIX Security Symposium
    • Shankar, U.1    Talwar, K.2    Foster, J.S.3    Wagner, D.4
  • 20
    • 85175134354 scopus 로고    scopus 로고
    • ISBN 978-1893115408. Citations in this document: §1.2
    • Dave Sill, The qmail handbook, Apress, 2002. ISBN 978-1893115408. Citations in this document: §1.2.
    • (2002) The Qmail Handbook, Apress
    • Sill, D.1
  • 23
    • 85084164351 scopus 로고    scopus 로고
    • Linux security modules: General security support for the linux kernel
    • URL Citations in this document: §2.5
    • Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman, Linux security modules: general security support for the Linux kernel, 11th USENIX Security Symposium (2002). URL: http://www.usenix.org/ events/sec02/wright.html. Citations in this document: §2.5.
    • (2002) 11th USENIX Security Symposium
    • Wright, C.1    Cowan, C.2    Smalley, S.3    Morris, J.4    Kroah-Hartman, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.