-
1
-
-
0003513832
-
Security analysis and enhancements of computer operating systems
-
The RISOS Project, Lawrence Livermore Laboratory, Livermore, CA, USA, Apr., Published by the Institute for Computer Sciences and Technology, National Bureau of Standards, Washington, DC, USA
-
R. P. Abbott, J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tukubo, and D. A. Webb. Security analysis and enhancements of computer operating systems. NBSIR 76-1041, The RISOS Project, Lawrence Livermore Laboratory, Livermore, CA, USA, Apr. 1976. Published by the Institute for Computer Sciences and Technology, National Bureau of Standards, Washington, DC, USA.
-
(1976)
NBSIR
, pp. 76-1041
-
-
Abbott, R.P.1
Chin, J.S.2
Donnelley, J.E.3
Konigsford, W.L.4
Tukubo, S.5
Webb, D.A.6
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
8 November
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 8 November 1996. URL: http://www.phrack.org/show.php?p=49&a=14.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
-
5
-
-
0004200684
-
Computer security technology planning study
-
Vols. I and II, James P. Anderson and Co., Fort Washington, PA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, Oct
-
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Vols. I and II, James P. Anderson and Co., Fort Washington, PA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, Oct. 1972. URL: http://csrc.nist.gov/publications/history/ande72.pdf.
-
(1972)
Technical Report ESD-TR-73-51
-
-
Anderson, J.P.1
-
6
-
-
0036086884
-
Using programmer-written compiler extensions to catch security holes may 2002
-
Oakland, California
-
K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes, May 2002. In IEEE Symposium on Security and Privacy, Oakland, California.
-
IEEE Symposium on Security and Privacy
-
-
Ashcraft, K.1
Engler, D.2
-
9
-
-
2442605789
-
Protection analysis: Final report
-
Marina del Rey, CA, May
-
R. Bisbey and D. Hollingworth. Protection analysis: Final report. Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, Marina del Rey, CA, May 1978. URL: http://csrc.nist.gov/publications/history/bisb78.pdf.
-
(1978)
Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California
-
-
Bisbey, R.1
Hollingworth, D.2
-
12
-
-
85027573859
-
Protecting data & information: A workshop in computer & data security
-
Maynard, MA
-
M. G. Carter, S. B. Lipner, and P. A. Karger. Protecting data & information: A workshop in computer & data security. Technical Report EY-AX00080-SM-001, Digital Equipment Corporation, Maynard, MA, 1982.
-
(1982)
Technical Report EY-AX00080-SM-001, Digital Equipment Corporation
-
-
Carter, M.G.1
Lipner, S.B.2
Karger, P.A.3
-
14
-
-
0038349200
-
MOPS: An infrastructure for examining security properties of software
-
Washington, DC, Nov. 18-22
-
H. Chen and D. Wagner. MOPS: an infrastructure for examining security properties of software. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 235-244, Washington, DC, Nov. 18-22, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Chen, H.1
Wagner, D.2
-
15
-
-
0018907788
-
A penetration analysis of the Michigan terminal system
-
Jan
-
B. Hebbard, P. Grosso, T. Baldridge, C. Chan, D. Fishman, P. Coshgarian, T. Hilton, J. Hoshen, K. Hoult, G. Huntley, M. Stolarchuk, and L. Warner. A penetration analysis of the michigan terminal system. Operating Systems Review, 14(1):7-20, Jan. 1980.
-
(1980)
Operating Systems Review
, vol.14
, Issue.1
, pp. 7-20
-
-
Hebbard, B.1
Grosso, P.2
Baldridge, T.3
Chan, C.4
Fishman, D.5
Coshgarian, P.6
Hilton, T.7
Hoshen, J.8
Hoult, K.9
Huntley, G.10
Stolarchuk, M.11
Warner, L.12
-
18
-
-
85027552912
-
Network security: Threats and solutions
-
International Engineering Consortium, Chicago, IL
-
P. A. Karger. Network security: Threats and solutions. In The Internet and Telecommunications: Architectures, Technologies, and Business Developments, pages 127-133. International Engineering Consortium, Chicago, IL, 1998.
-
(1998)
The Internet and Telecommunications: Architectures, Technologies, and Business Developments
, pp. 127-133
-
-
Karger, P.A.1
-
19
-
-
3042716872
-
-
Technical Report ESD-TR-74-193, Vol. II, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June
-
P. A. Karger and R. R. Schell. Multics security evaluation: Vulnerability analysis. Technical Report ESD-TR-74-193, Vol. II, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June 1974. URL: http://csrc.nist.gov/publications/history/karg74.pdf.
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
-
-
Karger, P.A.1
Schell, R.R.2
-
21
-
-
0026254933
-
A retrospective on the vax vmm security kernel
-
Nov
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11):1147-1165, Nov. 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
23
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Sept
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws. ACM Computer Surveys, 26(3):211-254, Sept. 1994.
-
(1994)
ACM Computer Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
28
-
-
84958951541
-
Program confinement in kvm/370
-
Seattle, WA, 16-19 Oct
-
M. Schaefer, B. Gold, R. Linde, and J. Scheid. Program confinement in KVM/370. In Proceedings of the 1977 ACM Annual Conference, pages 404-410, Seattle, WA, 16-19 Oct. 1977.
-
(1977)
Proceedings of the 1977 ACM Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
29
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
Mar
-
M. D. Schroeder and J. H. Saltzer. A hardware architecture for implementing protection rings. Commun. ACM, 15(3):157-170, Mar. 1972.
-
(1972)
Commun. ACM
, vol.15
, Issue.3
, pp. 157-170
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
32
-
-
85027546130
-
The hidden dangers of documents: Dot.life - How technology changes us
-
18 August
-
M. Ward. The hidden dangers of documents: Dot.life - how technology changes us. BBC News - World Edition, 18 August 2003. URL: http://news.bbc.co.uk/2/hi/technology/3154479.stm.
-
(2003)
BBC News - World Edition
-
-
Ward, M.1
-
33
-
-
84875929384
-
Duping the soviets: The farewell dossier
-
G. Weiss. Duping the soviets: The farewell dossier. Studies in Intelligence, 39(5), 1996. URL: http://www.odci.gov/csi/studies/96unclass/ farewell.htm.
-
(1996)
Studies in Intelligence
, vol.39
, Issue.5
-
-
Weiss, G.1
|