메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 182-191

Isolated program execution: An application transparent approach for executing untrusted programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS; UTILITY PROGRAMS;

EID: 84944734361     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254323     Document Type: Conference Paper
Times cited : (48)

References (24)
  • 1
    • 84944777779 scopus 로고    scopus 로고
    • Alcatraz. http://www.seclab.cs.sunysb.edu/alcatraz.
  • 3
    • 84944777780 scopus 로고    scopus 로고
    • Strace. http://www.liacs.nl/~wichert/strace.
  • 4
    • 85084161234 scopus 로고    scopus 로고
    • Mapbox: Using parameterized behavior classes to confine applications
    • A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In USENIX Security Symposium, 2000.
    • (2000) USENIX Security Symposium
    • Acharya, A.1    Raje, M.2
  • 9
  • 10
    • 85180753454 scopus 로고    scopus 로고
    • User-level infrastructure for system call int erposition: A platform for intrusion detection and confinement
    • K. Jain and R. Sekar. User-level infrastructure for system call int erposition: A platform for intrusion detection and confinement. In ISOC Network and Distributed System Security, 2000.
    • (2000) ISOC Network and Distributed System Security
    • Jain, K.1    Sekar, R.2
  • 11
    • 84944777782 scopus 로고    scopus 로고
    • Application-level isolation to cope with malicious database users
    • S. Jajodia, P. Liu, and C. D. McCollum. Application-level isolation to cope with malicious database users. In ACSAC, 1998.
    • (1998) ACSAC
    • Jajodia, S.1    Liu, P.2    McCollum, C.D.3
  • 12
    • 35248830724 scopus 로고    scopus 로고
    • Softwarepot: An encapsulated transferable file system for secure software circulation
    • K. Kato and Y. Oyama. Softwarepot: An encapsulated transferable file system for secure software circulation. In Proc. of Int. Symp. on Software Security, 2003.
    • (2003) Proc. of Int. Symp. on Software Security
    • Kato, K.1    Oyama, Y.2
  • 15
    • 0034479192 scopus 로고    scopus 로고
    • Secure execution of Java applets using a remote playground
    • D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. Software Engineering, 26(12), 2000.
    • (2000) Software Engineering , vol.26 , Issue.12
    • Malkhi, D.1    Reiter, M.K.2
  • 20
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the USENIX Security Symposium, 1999.
    • (1999) Proceedings of the USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 21
    • 84944777785 scopus 로고    scopus 로고
    • K. Sitaker. http://www.canonical.org/picturepages.
    • Sitaker, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.