-
1
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, MITRE Corporation, Bedford, MA, March
-
Bell, D. E., La Padula, L. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corporation, Bedford, MA, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
La Padula, L.2
-
2
-
-
0003400255
-
-
Technical Report mtr-3153, MITRE Corporation, Bedford, MA, April
-
Biba, K. J. Integrity Considerations for Secure Computer Systems. Technical Report mtr-3153, MITRE Corporation, Bedford, MA, April 1977.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
3
-
-
0007986382
-
The KeyKOS nanokernel architecture
-
April
-
Bomberger, A. C., Frantz, A. P., Frantz, W. S., Hardy, A. C., Hardy, N., Landau, C. R., Shapiro, J. S. The KeyKOS nanokernel architecture. In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, April 1992, 95-112.
-
(1992)
Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures
, pp. 95-112
-
-
Bomberger, A.C.1
Frantz, A.P.2
Frantz, W.S.3
Hardy, A.C.4
Hardy, N.5
Landau, C.R.6
Shapiro, J.S.7
-
4
-
-
33845414042
-
Labels and event processes in the asbestos operating system
-
DOI 10.1145/1095809.1095813
-
Efstathopoulos, P., Krohn, M., Van De Bogart, S., Frey, C., Ziegler, D., Kohler, E., Mazières, D., Kaashoek, F., Morris, R. Labels and event processes in the Asbestos operating system. In Proceedings of the 20th SOSP (Brighton, U. K., October 2005), 17-30. (Pubitemid 44892202)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazieres, D.7
Kaashoek, F.8
Morris, R.9
-
5
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Oakland, CA, May
-
Fraser, T. LOMAC: low water-mark integrity protection for COTS environments. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 2000), 230-245.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
6
-
-
85084161535
-
The Spring nucleus: A microkernel for objects
-
Cincinnati, OH, April
-
Hamilton, G., Kougiouris, P. The Spring nucleus: a microkernel for objects. In Proceedings of the Summer 1993 USENIX (Cincinnati, OH, April 1993), 147-159.
-
(1993)
Proceedings of the Summer 1993 USENIX
, pp. 147-159
-
-
Hamilton, G.1
Kougiouris, P.2
-
7
-
-
84885608511
-
Make least privilege a right (not a privilege)
-
Santa Fe, NM, June
-
Krohn, M., Efstathopoulos, P., Frey, C., Kaashoek, F., Kohler, E., Mazières, D., Morris, R., Osborne, M., Van De Bogart, S., Ziegler, D. Make least privilege a right (not a privilege). In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (Santa Fe, NM, June 2005).
-
(2005)
Proceedings of the 10th Workshop on Hot Topics in Operating Systems
-
-
Krohn, M.1
Efstathopoulos, P.2
Frey, C.3
Kaashoek, F.4
Kohler, E.5
Mazières, D.6
Morris, R.7
Osborne, M.8
Van De Bogart, S.9
Ziegler, D.10
-
8
-
-
57749192483
-
Information flow control for standard OS abstractions
-
Stevenson, WA, October
-
Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M. F., Kohler, E., Morris, R. Information flow control for standard OS abstractions. In Proceedings of the 21st SOSP (Stevenson, WA, October 2007), 321-334.
-
(2007)
Proceedings of the 21st SOSP
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
9
-
-
0019608720
-
Formal models for computer security
-
September
-
Landwehr, C. E. Formal models for computer security. Comput. Surv. 13, 3(September 1981), 247-278.
-
(1981)
Comput. Surv
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
10
-
-
80155212272
-
Anti-virus vulnerabilities strike again
-
March
-
Leyden, J. Anti-virus vulnerabilities strike again. The Register, March 2005. http://www.theregister. co.uk/2005/03/18/mcafee-vuln/
-
(2005)
The Register
-
-
Leyden, J.1
-
11
-
-
2442425355
-
Integrating flexible support for security policies into the linux operating system
-
Boston, MA, June, FREENIX track
-
Loscocco, P., Smalley, S. Integrating flexible support for security policies into the linux operating system. In Proceedings of the 2001 USENIX (Boston, MA, June 2001), 29-40, FREENIX track.
-
(2001)
Proceedings of the 2001 USENIX
, pp. 29-40
-
-
Loscocco, P.1
Smalley, S.2
-
12
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
McIlroy, M. D., Reeds, J. A. Multilevel security in the UNIX tradition. Softw. Pract. Exp. 22, 8(1992), 673-694. (Pubitemid 23567587)
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
13
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
Myers, A. C., Liskov, B. Protecting privacy using the decentralized label model. Trans. Comput. Syst. 9, 4(October 2000), 410-442.
-
(2000)
Trans. Comput. Syst
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
14
-
-
80155134880
-
Symantec antivirus worm hole puts millions at risk
-
May
-
Naraine, R. Symantec antivirus worm hole puts millions at risk. eWeek.com, May 2006. http://www.eweek. com/article2/0, 1895, 1967941, 00.asp
-
(2006)
EWeek.com
-
-
Naraine, R.1
-
15
-
-
80155176060
-
Anti-virus rife with vulnerabilities
-
January
-
Peterson, D. Anti-virus rife with vulnerabilities. digitalbond.com, January 2008. http://www.digitalbond.com/index.php/2008/01/07/anti-virus-rife- with-vulnerabilities/
-
(2008)
Digitalbond.com
-
-
Peterson, D.1
-
16
-
-
80155199329
-
A hardware architecture for implementing protection rings
-
New York, March
-
Schroeder, M. D., Saltzer, J. H. A hardware architecture for implementing protection rings. In Proceedings of the 3rd SOSP (New York, March 1972), 42-54.
-
(1972)
Proceedings of the 3rd SOSP
, pp. 42-54
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
17
-
-
0001421170
-
EROS: A fast capability system
-
Shapiro, J. S., Smith, J. M., Farber, D. J. EROS: a fast capability system. In Proceedings of the 17th SOSP (Island Resort, SC, December 1999), 170-185. (Pubitemid 129548355)
-
(1999)
Operating Systems Review (ACM)
, vol.33
, Issue.5
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
18
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, November
-
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D. Making information flow explicit in HiStar. In Proceedings of the 7th OSDI (Seattle, WA, November 2006), 263-278.
-
(2006)
Proceedings of the 7th OSDI
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
19
-
-
85094632142
-
Securing distributed systems with information flow control
-
San Francisco, CA, April
-
Zeldovich, N., Boyd-Wickizer, S., Mazières, D. Securing distributed systems with information flow control. In Proceedings of the 5th NSDI (San Francisco, CA, April 2008), 293-308.
-
(2008)
Proceedings of the 5th NSDI
, pp. 293-308
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
-
20
-
-
77952337533
-
Hardware enforcement of application security policies
-
San Diego, CA, December
-
Zeldovich, N., Kannan, H., Dalton, M., Kozyrakis, C. Hardware enforcement of application security policies. In Proceedings of the 8th OSDI (San Diego, CA, December 2008), 225-240.
-
(2008)
Proceedings of the 8th OSDI
, pp. 225-240
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
|