-
1
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March
-
D. E. Bell and L. La Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
La Padula, L.2
-
2
-
-
0007986382
-
The KeyKOS nanokernel architecture
-
April
-
A. C. Bomberger, A. P. Frantz, W. S. Frantz, A. C. Hardy, N. Hardy, C. R. Landau, and J. S. Shapiro. The KeyKOS nanokernel architecture. In Proc. of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, pages 95–112, April 1992.
-
(1992)
Proc. of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures
, pp. 95-112
-
-
Bomberger, A.C.1
Frantz, A.P.2
Frantz, W.S.3
Hardy, A.C.4
Hardy, N.5
Landau, C.R.6
Shapiro, J.S.7
-
3
-
-
85076723812
-
-
ClamAV. http://www.clamav.net/.
-
-
-
-
4
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236–243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
5
-
-
33845414042
-
Labels and event processes in the Asbestos operating system
-
October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. of the 20th SOSP, pages 17–30, October 2005.
-
(2005)
Proc. of the 20th SOSP
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
7
-
-
0033690785
-
LOMAC: Low water-mark integrity protection for COTS environments
-
Oakland, CA, May
-
T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 230–245, Oakland, CA, May 2000.
-
(2000)
Proc. of the 2000 IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
9
-
-
33745212805
-
An overview of the Singularity project
-
Microsoft, Redmond, WA, October
-
G. C. Hunt, J. R. Larus, M. Abadi, M. Aiken, P. Barham, M. Fahndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. An overview of the Singularity project. Technical Report MSR-TR-2005-135, Microsoft, Redmond, WA, October 2005.
-
(2005)
Technical Report MSR-TR-2005-135
-
-
Hunt, G.C.1
Larus, J.R.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fahndrich, M.6
Hawblitzel, C.7
Hodson, O.8
Levi, S.9
Murphy, N.10
Steensgaard, B.11
Tarditi, D.12
Wobber, T.13
Zill, B.14
-
10
-
-
0019608720
-
Formal models for computer security
-
September
-
C. E. Landwehr. Formal models for computer security. Computing Survels, 13(3):247–278, September 1981.
-
(1981)
Computing Survels
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
11
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
June FREENIX track
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. of the 2001 USENIX, pages 29–40, June 2001. FREENIX track.
-
(2001)
Proc. of the 2001 USENIX
, pp. 29-40
-
-
Loscocco, P.1
Smalley, S.2
-
12
-
-
85076768215
-
-
LWIP. http://savannah.nongnu.org/projects/lwip/.
-
-
-
-
14
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. Transactions on Computer Systems, 9(4):410–442, October 2000.
-
(2000)
Transactions on Computer Systems
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
15
-
-
80155134880
-
Symantec antivirus worm hole puts millions at risk
-
May
-
R. Naraine. Symantec antivirus worm hole puts millions at risk. eWeek.com, May 2006. http://www.eweek.com/article2/0,1895,1967941,00.asp.
-
(2006)
eWeek.Com
-
-
Naraine, R.1
-
16
-
-
85076768405
-
-
OpenVPN. http://openvpn.net/.
-
-
-
-
17
-
-
0001300585
-
Plan 9 from Bell labs
-
Summer
-
R. Pike, D. Presotto, S. Dorward, B. Flandrena, K. Thompson, H. Trickey, and P. Winterbottom. Plan 9 from Bell Labs. Computing Systems, 8(3): 221–254, Summer 1995.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
Presotto, D.2
Dorward, S.3
Flandrena, B.4
Thompson, K.5
Trickey, H.6
Winterbottom, P.7
-
19
-
-
21644463808
-
Slammer worm crashed Ohio nuke plant net
-
August 20
-
K. Poulsen. Slammer worm crashed Ohio nuke plant net. The Register, August 20, 2003. http://www.theregister.co.uk/2003/08/20/ slammer worm crashed ohio nuke/.
-
(2003)
The Register
-
-
Poulsen, K.1
-
20
-
-
84883295790
-
The design and implementation of a log-structured file system
-
Oct
-
M. Rosenblum and J. Ousterhout. The design and implementation of a log-structured file system. In Proc. of the 13th SOSP, pages 1–15, Oct. 1991.
-
(1991)
Proc. of the 13th SOSP
, pp. 1-15
-
-
Rosenblum, M.1
Ousterhout, J.2
-
22
-
-
85076747464
-
-
Publication 100217279, Rev. L edition, March
-
Seagate. Barracuda 7200.7 Product Manual, Publication 100217279, Rev. L edition, March 2004. http://www.seagate.com/support/disc/manuals/ata/cuda7200pm.pdf.
-
(2004)
Barracuda 7200.7 Product Manual
-
-
-
24
-
-
85084161766
-
Scalability in the XFS file system
-
San Diego, CA, USA, 22–26
-
A. Sweeney, D. Doucette, W. Hu, C. Anderson, M. Nishimoto, and G. Peck. Scalability in the XFS file system. In Proceedings of the USENIX 1996 Technical Conference, pages 1–14, San Diego, CA, USA, 22–26 1996.
-
(1996)
Proceedings of the USENIX 1996 Technical Conference
, pp. 1-14
-
-
Sweeney, A.1
Doucette, D.2
Hu, W.3
Anderson, C.4
Nishimoto, M.5
Peck, G.6
-
25
-
-
85076781486
-
-
uClibc. http://uclibc.org/.
-
-
-
|