-
1
-
-
84889055552
-
-
Technical Report, Dept. of Computer Science and Engineering, University of Washington, Seattle, UWCSE-97-11-01, May
-
R.Grimm, B.Bershad, "Access Control in Extensible Systems," Technical Report, Dept. of Computer Science and Engineering, University of Washington, Seattle, UWCSE-97-11-01, May 1997.
-
(1997)
Access Control in Extensible Systems
-
-
Grimm, R.1
Bershad, B.2
-
2
-
-
0030712748
-
The 6th workshop on hot topics in operating systems (hotos-vi)
-
May
-
R.Grimm, B.Bershad. Security for Extensible Systems, "The 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)," Cape Cod, Massachusetts, pp. 62-66, May 1997.
-
(1997)
Cape Cod, Massachusetts
, pp. 62-66
-
-
Grimm, R.1
Bershad, B.2
-
4
-
-
0025435009
-
Amoeba : A distributed operating system for the 1990s
-
May
-
S.J. Tanenbaum, R.van Renesse, H.van Staveren, "Amoeba : a Distributed Operating System for the 1990s," IEEE Computer, pp. 44-53, May 1990.
-
(1990)
IEEE Computer
, pp. 44-53
-
-
Tanenbaum, S.J.1
Van Renesse, R.2
Van Staveren, H.3
-
5
-
-
0003400251
-
Secure computer systems : Mathematical foundations
-
ESD-TR-73-278
-
D.Bell, L.Lapadula, "Secure Computer Systems : Mathematical Foundations," Technical Report, Mitre Corporation, Vol.1, ESD-TR-73-278, 1973.
-
(1973)
Technical Report, Mitre Corporation
, vol.1
-
-
Bell, D.1
Lapadula, L.2
-
6
-
-
84889014912
-
Computer systems : A mathematical model
-
ESD-TR-73-278
-
L.Lapadula, D.Bell. Secure, "Computer Systems : A Mathematical Model," Technical Report, Mitre Corporation, Vol.2, ESD-TR-73-278, 1973.
-
(1973)
Technical Report, Mitre Corporation
, vol.2
-
-
Lapadula, L.1
Secure, D.B.2
-
7
-
-
0003400251
-
-
Technical Report, Mitre Corporation, ESD-TR-75-306
-
D.Bell, L.Lapadula, "Secure Computer Systems : Unified Exposition and Multics Interpretation," Technical Report, Mitre Corporation, ESD-TR-75-306, 1975.
-
(1975)
Secure Computer Systems : Unified Exposition and Multics Interpretation
-
-
Bell, D.1
Lapadula, L.2
-
9
-
-
0027699087
-
Lattice-based access control models
-
Nov
-
R.S.Sandhu, "Lattice-Based Access Control Models," IEEE Computer, Vol.26, No.11, pp. 9-19, Nov. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
11
-
-
0030086382
-
Role-based access control models
-
Feb
-
R.S.Sandhu, E.J.Coyne, H.L.Feinstein, C.E.Youman, "Role-Based Access Control Models," IEEE Computer, Vol.29, No.2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
0004743526
-
A standardized security device dedicated to public cryptology
-
edited by Gustavus J. Simmons, IEEE Press
-
L.C.Guillou, M.Ugon, J.J.Quisquater, "A Standardized Security Device Dedicated to Public Cryptology," Contemporary Cryptology : The Science of Information Integrity, edited by Gustavus J.Simmons, IEEE Press, pp. 561-613, 1992.
-
(1992)
Contemporary Cryptology : The Science of Information Integrity
, pp. 561-613
-
-
Guillou, L.C.1
Ugon, M.2
Quisquater, J.J.3
-
13
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
B.W.Lampson, "A Note on the Confinement Problem," Communications of the ACM, Vol.10, No.16, pp. 613-615, Oct. 1973.
-
(1973)
Communications of the ACM
, vol.10
, Issue.16
, pp. 613-615
-
-
Lampson, B.W.1
-
14
-
-
84945721946
-
A comment on the confinement problem
-
Nov
-
S.Lipner, "A Comment on the Confinement Problem," Operating System Review, Vol.9, No.5, pp. 192-196, Nov. 1975.
-
(1975)
Operating System Review
, vol.9
, Issue.5
, pp. 192-196
-
-
Lipner, S.1
-
16
-
-
0031163948
-
Secure code distribution
-
Jun
-
X.N.Zhang, "Secure Code Distribution," IEEE Computer, pp. 76-79, Jun. 1997.
-
(1997)
IEEE Computer
, pp. 76-79
-
-
Zhang, X.N.1
-
17
-
-
0031078841
-
Trusting mobile user devices and security modules
-
Feb
-
A.Pfitzmann, B.Pfitzmann, M.Schunter, M.Waidner, "Trusting Mobile User Devices and Security Modules," IEEE Computer, pp. 61-68, Feb. 1997.
-
(1997)
IEEE Computer
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
23
-
-
0003969635
-
Department of defense trusted computer system evaluation criteria
-
Department of Defense Computer Security Center Dec.
-
Department of Defense Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria," Departement of Defense Standard DoD, Dec. 1985.
-
(1985)
Departement of Defense Standard DoD
-
-
-
26
-
-
0004196480
-
-
Ph. D. Thesis, Carnegie Mellon University
-
B.S.Yee, "Using Secure Coprocessor," Ph.D. Thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessor
-
-
Yee, B.S.1
-
27
-
-
2642578695
-
An introduction to citadel- A secure coprocessor for workstations
-
Curacao, Dutch Antilles, May
-
E.Palmer, "An Introduction to Citadel-a Secure Coprocessor for Workstations," IFIP SEC'94 Conference, Curacao, Dutch Antilles, May 1994.
-
(1994)
IFIP SEC'94 Conference
-
-
Palmer, E.1
-
28
-
-
0002380073
-
Tamper resistance- A cautionary note
-
Nov
-
R.Anderson, M.Kuhn, "Tamper Resistance-a Cautionary Note," Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California, pp. 1-11, Nov. 1996.
-
(1996)
Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
29
-
-
0029392001
-
Itinerant agents for mobile computing
-
Oct
-
D.Chess, B.Grosof, C.Harrison, D.Levine, C.Parris, and G.Tsudik, "Itinerant agents for mobile computing," IEEE Personal Communication Systems, 2(5), pp. 34-49, Oct. 1995.
-
(1995)
IEEE Personal Communication Systems
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
30
-
-
3943088348
-
A security model for aglets
-
July/August
-
G.Karjoth, D.B.Lange, and M.Oshima, "A security model for aglets," IEEE Internet Computing, 1(4) pp.68-77, July/August 1997.
-
(1997)
IEEE Internet Computing
, vol.1
, Issue.4
, pp. 68-77
-
-
Karjoth, G.1
Lange, D.B.2
Oshima, M.3
-
31
-
-
84947905092
-
Aglets: Programming mobile agents in java
-
Berlin Germany, March
-
D.B.Lange, M.Oshima, G.Karjoth, and K.Kosaka, "Aglets: Programming mobile agents in java," 1st Int'l Conf. on Worldwide Computing and Its Applications '97 (WWCA97), Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, March 1997.
-
(1997)
1st Int'l Conf. on Worldwide Computing and Its Applications '97 (WWCA97), Lecture Notes in Computer Science. Springer-Verlag
-
-
Lange, D.B.1
Oshima, M.2
Karjoth, G.3
Kosaka, K.4
-
32
-
-
0005428393
-
An architecture of security management unit for safe hosting of multiple agents
-
Nov
-
T.Gilmont, J-D.Legat, J-J.Quisquater, "An Architecture of Security Management Unit for Safe Hosting of Multiple Agents," International Workshop on Intelligent Communications and Multimedia Terminals (COST254), Ljubljana, pp 79-82, Nov. 1998.
-
(1998)
International Workshop on Intelligent Communications and Multimedia Terminals (COST254), Ljubljana
, pp. 79-82
-
-
Gilmont, T.1
Legat, J.-D.2
Quisquater, J.-J.3
-
33
-
-
0033601686
-
An architecture of security management unit
-
Jan
-
T. Gilmont, J-D.Legat, J-J.Quisquater, "An Architecture of Security Management Unit,"Proceedings of SPIE: Security and Watermarking of Multimedia Contents, San Jose, Vol.3657, pp. 472-483, Jan. 1999.
-
(1999)
Proceedings of spie: Security and watermarking of multimedia contents, san jose
, vol.3657
, pp. 472-483
-
-
Gilmont, T.1
Legat, J.-D.2
Quisquater, J.-J.3
-
34
-
-
0344139895
-
A class of replacement policies for medium and high-associativity structures
-
Y.Deville and J.Gobert, "A Class of Replacement Policies for Medium and High-Associativity Structures," Computer Architecture News, Vol.20, No.1, pp. 55-61, 1992.
-
(1992)
Computer Architecture News
, vol.20
, Issue.1
, pp. 55-61
-
-
Deville, Y.1
Gobert, J.2
|