-
1
-
-
0004200684
-
Computer security technology planning study
-
Hanscom AFB, Badford, MA
-
ANDERSON, J. P. Computer security technology planning study. Tech. Rep. ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA, 1972.
-
(1972)
Tech. Rep. ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division
-
-
Anderson, J.P.1
-
4
-
-
84937711477
-
-
Selinux/audit2allow. http://fedoraproject.org/wiki/SELinux/audit2allow.
-
Selinux/audit2allow
-
-
-
5
-
-
85084162952
-
A domain and type enforcement unix prototype
-
BADGER, L., STERNE, D. F., SHERMAN, D. L., WALKER, K. M., AND HAGHIGHAT, S. A. A domain and type enforcement UNIX prototype. In Proceedings of the 5th USENIX Security Symposium (1995).
-
(1995)
Proceedings of the 5th USENIX Security Symposium
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
7
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
L. G. Hanscom Field, Bedford, MA, March, Also, MITRE Technical Report MTR-2997
-
BELL, D. E., AND LAPADULA, L. J. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, March 1976. Also, MITRE Technical Report MTR-2997.
-
(1976)
Tech. Rep. ESD-TR-75-306, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC)
-
-
Bell, D.E.1
Lapadula, L.J.2
-
8
-
-
0003400255
-
Integrity considerations for secure computer systems
-
April
-
BIBA, K. J. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE, April 1977.
-
(1977)
Tech. Rep. MTR-3153, MITRE
-
-
Biba, K.J.1
-
10
-
-
80755168339
-
Amazonia: When elasticity snaps back
-
BUGIEL, S., NÜRNBERGER, S., PÖPPELMANN, T., SADEGHI, A., AND SCHNEIDER, T. AmazonIA: When elasticity snaps back. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS) (2011), pp. 389-400.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 389-400
-
-
Bugiel, S.1
Nürnberger, S.2
Pöppelmann, T.3
Sadeghi, A.4
Schneider, T.5
-
11
-
-
84869447330
-
Self-service cloud computing
-
New York, NY, USA, CCS '12, ACM
-
BUTT, S., LAGAR-CAVILLA, H. A., SRIVASTAVA, A., AND GANAPATHY, V. Self-service cloud computing. In Proceedings of the 2012 ACM conference on Computer and communications security (New York, NY, USA, 2012), CCS '12, ACM, pp. 253-264.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 253-264
-
-
Butt, S.1
Lagar-cavilla, H.A.2
Srivastava, A.3
Ganapathy, V.4
-
12
-
-
84937675558
-
-
CVE-2012-3542. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3542.
-
CVE-2012-3542
-
-
-
13
-
-
84937700536
-
-
CVE-2012-4456. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4456.
-
CVE-2012-4456
-
-
-
14
-
-
84937697833
-
-
CVE-2014-0167. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0167.
-
CVE-2014-0167
-
-
-
15
-
-
78650092747
-
Analyzing and comparing the protection quality of security enhanced operating systems
-
CHEN, H., LI, N., AND MAO, Z. Analyzing and comparing the protection quality of security enhanced operating systems. In NDSS (2009).
-
(2009)
NDSS
-
-
Chen, H.1
Li, N.2
Mao, Z.3
-
16
-
-
84937718442
-
-
Cloudlinux. http://www.cloudlinux.com/.
-
Cloudlinux
-
-
-
17
-
-
84937686378
-
-
Oracle solaris 11. http://www.oracle.com/us/products/servers-storage/solaris/solaris11/overview/index.html/.
-
Oracle Solaris 11
-
-
-
18
-
-
85060818077
-
Introduction and overview of the multics system
-
Proceedings of the November 30-December 1, 1965, (New York, NY, USA, ), AFIPS '65 (Fall, part I), ACM
-
CORBATÓ, F. J., AND VYSSOTSKY, V. A. Introduction and overview of the multics system. In Proceedings of the November 30-December 1, 1965, Fall Joint Computer Conference, Part I (New York, NY, USA, 1965), AFIPS '65 (Fall, part I), ACM, pp. 185-196.
-
(1965)
Fall Joint Computer Conference, Part I
, pp. 185-196
-
-
Corbató, F.J.1
Vyssotsky, V.A.2
-
19
-
-
0016949746
-
A lattice model of secure information flow
-
DENNING, D. A Lattice Model of Secure Information Flow. Communications of the ACM 19, 5 (1976).
-
(1976)
Communications of the ACM
, vol.19
, pp. 5
-
-
Denning, D.1
-
20
-
-
84937690941
-
-
CVE-2012-3360. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3360.
-
CVE-2012-3360
-
-
-
21
-
-
84937676485
-
-
CVE-2012-3361. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3361.
-
CVE-2012-3361
-
-
-
22
-
-
84937722026
-
-
CVE-2012-3447. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3447.
-
CVE-2012-3447
-
-
-
23
-
-
84937697576
-
-
CVE-2013-0247. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0247.
-
CVE-2013-0247
-
-
-
24
-
-
84937692138
-
-
CVE-2013-0270. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0270.
-
CVE-2013-0270
-
-
-
25
-
-
84937719163
-
-
CVE-2014-2828. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2828.
-
CVE-2014-2828
-
-
-
26
-
-
84886582205
-
-
Eucalyptus. https://www.eucalyptus.com/.
-
Eucalyptus
-
-
-
27
-
-
85084162795
-
Detecting manipulated remote call streams
-
Berkeley, CA, USA, USENIX Association
-
GIFFIN, J. T., JHA, S., AND MILLER, B. P. Detecting manipulated remote call streams. In Proceedings of the 11th USENIX Security Symposium (Berkeley, CA, USA, 2002), USENIX Association, pp. 61-79.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 61-79
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
28
-
-
84937719581
-
-
CVE-2014-0162. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0162.
-
CVE-2014-0162
-
-
-
29
-
-
1642387378
-
Domain and type enforcement for linux
-
Oct
-
HALLYN, S. E., AND KEARNS, P. Domain and type enforcement for Linux. In Proceedings of the 4th Annual Linux Showcase and Conference (Oct. 2000). At http://www.sagecertification.org/publications/library/proceedings/als00/2000papers/papers/full-papers/hallyn/hallyn-html/index.html.
-
(2000)
Proceedings of the 4th Annual Linux Showcase and Conference
-
-
Hallyn, S.E.1
Kearns, P.2
-
30
-
-
0024089972
-
The confused deputy
-
Oct
-
HARDY, N. The confused deputy. Operating Systems Review 22, 4 (Oct. 1988), 36-38.
-
(1988)
Operating Systems Review
, vol.22
, pp. 36-38
-
-
Hardy, N.1
-
31
-
-
84937717560
-
-
CVE-2011-4596. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4596.
-
CVE-2011-4596
-
-
-
32
-
-
84937718746
-
-
CVE-2013-0208. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0208.
-
CVE-2013-0208
-
-
-
33
-
-
84937699593
-
-
CVE-2014-0187. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0187.
-
CVE-2014-0187
-
-
-
35
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
October
-
LOSCOCCO, P. A., SMALLEY, S. D., MUCKELBAUER, P. A., TAYLOR, R. C., TURNER, S. J., AND FARRELL, J. F. The Inevitability of Failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference (October 1998), pp. 303-314.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
41
-
-
84886594606
-
-
OpenNebula. http://opennebula.org/.
-
OpenNebula
-
-
-
47
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
48
-
-
0016555241
-
The protection of information in computer systems
-
September
-
SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (September 1975).
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
50
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
SCHELLHORN, G., REIF, W., SCHAIRER, A., KARGER, P. A., AUSTEL, V., AND TOLL, D. Verification of a formal security model for multiapplicative smart cards. In Proceedings of the European Symposium on Research in Computer Security (2000), pp. 17-36.
-
(2000)
Proceedings of the European Symposium on Research in Computer Security
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.A.4
Austel, V.5
Toll, D.6
-
51
-
-
84937722869
-
-
Selinux/mls. http://fedoraproject.org/wiki/SELinux/MLS.
-
Selinux/mls
-
-
-
52
-
-
84937684846
-
-
Feb
-
SUN MICROSYSTEMS. Trusted Solaris 8 Operating System. http://www.sun.com/software/solaris/trustedsolaris/, Feb. 2006.
-
(2006)
Trusted Solaris 8 Operating System
-
-
-
53
-
-
84937714071
-
-
CVE-2012-4406. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406.
-
CVE-2012-4406
-
-
-
54
-
-
84937699267
-
-
Reference Policy. http://oss.tresys.com/projects/refpolicy 2008.
-
(2008)
Reference Policy
-
-
-
55
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)
-
VARADARAJAN, V., KOOBURAT, T., FARLEY, B., RISTENPART, T., AND SWIFT, M. M. Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense). In ACM Conference on Computer and Communications Security (2012), pp. 281-292.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
56
-
-
84937690805
-
Jigsaw: Protecting resource access by inferring programmer expectations
-
Aug
-
VIJAYAKUMAR, H., GE, X., PAYER, M., AND JAEGER, T. JIGSAW: Protecting resource access by inferring programmer expectations. In Proceedings of the 23rd USENIX Security Symposium (Aug. 2014), pp. 973-988.
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
, pp. 973-988
-
-
Vijayakumar, H.1
Ge, X.2
Payer, M.3
Jaeger, T.4
-
57
-
-
84877716990
-
Process firewalls: Protecting processes during resource access
-
VIJAYAKUMAR, H., SCHIFFMAN, J., AND JAEGER, T. Process Firewalls: Protecting processes during resource access. In Proceedings of the Eighth ACM European Conference on Computer Systems (EuroSys) (2013), pp. 57-70.
-
(2013)
Proceedings of the Eighth ACM European Conference on Computer Systems (EuroSys)
, pp. 57-70
-
-
Vijayakumar, H.1
Schiffman, J.2
Jaeger, T.3
-
58
-
-
0034836394
-
Intrusion detection via static analysis
-
Washington, DC, USA, SP '01, IEEE Computer Society
-
WAGNER, D., AND DEAN, D. Intrusion detection via static analysis. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2001), SP '01, IEEE Computer Society, pp. 156.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
-
-
Wagner, D.1
Dean, D.2
-
59
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
New York, NY, USA, CCS '02, ACM
-
WAGNER, D., AND SOTO, P. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM Conference on Computer and Communications Security (New York, NY, USA, 2002), CCS '02, ACM, pp. 255-264.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
61
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
August
-
WRIGHT, C., COWAN, C., SMALLEY, S., MORRIS, J., AND KROAH-HARTMAN, G. Linux Security Modules: General security support for the Linux kernel. In Proceedings of the 11th USENIX Security Symposium (August 2002), pp. 17-31.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-hartman, G.5
-
62
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
New York, NY, USA, SOSP '11, ACM
-
ZHANG, F., CHEN, J., CHEN, H., AND ZANG, B. Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (New York, NY, USA, 2011), SOSP '11, ACM, pp. 203-216.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|