-
2
-
-
0030419725
-
A Domain and Type Enforcement UNIX Prototype
-
Cambridge, Massachusetts
-
L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker. A Domain and Type Enforcement UNIX Prototype. In Usenix Computing Systems Volume 9, Cambridge, Massachusetts, 1996.
-
(1996)
Usenix Computing Systems
, vol.9
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
-
3
-
-
0003400251
-
-
Technical Report Electronics Systems Division, AFSC, Hanscom AF Base, Bedford, Massachusetts
-
D. E. Bell and L. L. Padula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report ESD-TR-75-306, Electronics Systems Division, AFSC, Hanscom AF Base, Bedford, Massachusetts, 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Padula, L.L.2
-
4
-
-
80054992065
-
Extensibility, Safety and Performance in the SPIN Operating System
-
December
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Operating Systems Review, December 1995.
-
(1995)
Operating Systems Review
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
5
-
-
0003400255
-
-
Technical Report USAF Electronic Systems Division, Bedford, Massachusetts
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, Massachusetts, 1977.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
7
-
-
0024663398
-
Access Mediation in a Message Passing Kernel
-
May
-
M. Branstad, H. Tajalli, F. Mayer, and D. Dalva. Access Mediation in a Message Passing Kernel. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 66-72, May 1989.
-
(1989)
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 66-72
-
-
Branstad, M.1
Tajalli, H.2
Mayer, F.3
Dalva, D.4
-
11
-
-
0027961889
-
Self-Nonself Discrimination in a Computer
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-Nonself Discrimination in a Computer. In Proceedings of the 1994 IEEE Symposium on Security and Privacy, Oakland, California, 1994.
-
Proceedings of the 1994 IEEE Symposium on Security and Privacy, Oakland, California, 1994
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
12
-
-
0029716418
-
A Sense of Self for UNIX Processes
-
S. Forrest and T. A. L. Steven A. Hofmeyr, Anil Somayaji. A Sense of Self for UNIX Processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, California, 1996.
-
Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, California, 1996
-
-
Forrest, S.1
L, T.A.2
Hofmeyr, S.A.3
Somayaji, A.4
-
13
-
-
84946239898
-
-
OPEN, READ, REBOOT. Section 2
-
FreeBSD Online Manual. OPEN, READ, REBOOT. Section 2.
-
FreeBSD Online Manual
-
-
-
14
-
-
0003246945
-
SLIC: An Extensibility System for Commodity Operating Systems
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An Extensibility System for Commodity Operating Systems. In Proceedings of the USENIX 1998 Annual Technical Conference, New Orleans, Louisiana, 1998.
-
Proceedings of the USENIX 1998 Annual Technical Conference, New Orleans, Louisiana, 1998
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
16
-
-
33646529770
-
Planning, Petri Nets, and Intrusion Detection
-
Y. Ho, D. Frincke, and D. T. Jr. Planning, Petri Nets, and Intrusion Detection. In Proceedings of the 21st National Information Systems Security Conference, 1998.
-
Proceedings of the 21st National Information Systems Security Conference, 1998
-
-
Ho, Y.1
Frincke, D.2
T, D.3
-
21
-
-
0030677523
-
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997.
-
Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
22
-
-
0031233430
-
Intrusion Detection via System Call Traces
-
September/October
-
A. Kosoresow and S. Hofmeyr. Intrusion Detection via System Call Traces. IEEE Software, 14(5), September/October 1997.
-
(1997)
IEEE Software
, vol.14
, Issue.5
-
-
Kosoresow, A.1
Hofmeyr, S.2
-
24
-
-
0015672289
-
A Note on the Confinement Problem
-
B. W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10), 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
-
-
Lampson, B.W.1
-
25
-
-
0004138773
-
Security Tool Review: TCP Wrappers
-
November-December USENIX
-
M. A. Monroe. Security Tool Review: TCP Wrappers. ;login:, 18(6):15-16, November-December 1993. USENIX.
-
(1993)
Login
, vol.18
, Issue.6
, pp. 15-16
-
-
Monroe, M.A.1
-
29
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
September
-
B. C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. In IEEE Communications, September 1994.
-
(1994)
IEEE Communications
-
-
Neuman, B.C.1
Ts'o, T.2
-
33
-
-
85084100576
-
Dealing With Disaster: Surviving Misbehaved Kernel Extensions
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing With Disaster: Surviving Misbehaved Kernel Extensions. In Proceedings of the USENIX 2nd Symposium on Operating Systems Design and Implementation. Seattle, Washington, October 1996.
-
Proceedings of the USENIX 2nd Symposium on Operating Systems Design and Implementation. Seattle, Washington, October 1996
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
36
-
-
85084161648
-
Confining Root Programs with Domain and Type Enforcement
-
K. W. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and K. A. Oostendorp. Confining Root Programs with Domain and Type Enforcement. In Proceedings of the 6th Usenix Security Symposium, San Jose, California, 1996.
-
Proceedings of the 6th Usenix Security Symposium, San Jose, California, 1996
-
-
Walker, K.W.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Sherman, D.L.5
Oostendorp, K.A.6
|