-
1
-
-
85084161234
-
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
-
August
-
Acharya, A. and Raje, M. : MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications, Proceedings of the 9th USENIX Security Symposium, August 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
2
-
-
0032131867
-
Ufo: A Personal Global File System Based on User-Level Extensions to the Operating System
-
Alexandrov, A., Ibel, M., Schauser, K.E. and Scheiman, C.J. : Ufo: A Personal Global File System Based on User-Level Extensions to the Operating System, ACM Trans. Comput. Syst., Vol. 16, No. 3 (1998) pp. 207-233.
-
(1998)
ACM Trans. Comput. Syst.
, vol.16
, Issue.3
, pp. 207-233
-
-
Alexandrov, A.1
Ibel, M.2
Schauser, K.E.3
Scheiman, C.J.4
-
3
-
-
1642387377
-
Consh: Confined Execution Environment for Internet Computations
-
http://www.cs.ucsb.edu/~berto/papers/99-usenix-consh. ps, December
-
Alexandrov, A., Kmiec, P. and Schauser, K. : Consh: Confined Execution Environment for Internet Computations. http://www.cs.ucsb.edu/~berto/papers/99-usenix-consh.ps, December 1998.
-
(1998)
-
-
Alexandrov, A.1
Kmiec, P.2
Schauser, K.3
-
4
-
-
85084161168
-
TRON: Process-Specific File Protection for the UNIX Operating System
-
January
-
Berman, A., Bourassa, V. and Selberg, E. : TRON: Process-Specific File Protection for the UNIX Operating System, Proceedings of USENIX Winter 1995 Technical Conference, pp. 165-175, January 1995.
-
(1995)
Proceedings of USENIX Winter 1995 Technical Conference
, pp. 165-175
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
5
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Bishop, M. and Dilger, M. : Checking for Race Conditions in File Accesses, Computing Systems, Vol. 9, No. 2 (1996) pp. 131-152.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
6
-
-
10044275460
-
SubDomain: Parsimonious Server Security
-
December
-
Cowan, C., Beattie, S., Kroah-Hartman, G., Pu, C., Wagle, P. and Gligor, V. : SubDomain: Parsimonious Server Security, Proceedings of the 14th Systems Administration Conference (LISA 2000), December 2000.
-
(2000)
Proceedings of the 14th Systems Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
7
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker
-
July
-
Goldberg, I., Wagner, D., Thomas, R. and Brewer, E.A. : A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker, Proceedings of the 6th USENIX Security Symposium, pp. 1-13, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 1-13
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
8
-
-
85024720388
-
-
http://www.rpm.org/
-
Hat, R. : RPM. http://www.rpm.org/.
-
RPM
-
-
Hat, R.1
-
11
-
-
35048829099
-
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation, Technical Report ISE-TR-02-185
-
University of Tsukuba, January
-
Kato K. and Oyama, Y. : SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation, Technical Report ISE-TR-02-185, Institute of Information Sciences and Electronics, University of Tsukuba, January 2002.
-
(2002)
Institute of Information Sciences and Electronics
-
-
Kato, K.1
Oyama, Y.2
-
12
-
-
35048814752
-
Software Circulation using Sand-boxed File Space — Previous Experience and New Approach
-
June
-
Kato, K., Oyama, Y., Kanda, K. and Matsubara, K. : Software Circulation using Sand-boxed File Space — Previous Experience and New Approach —, Proceedings of the 8th ECOOP Workshop on Mobile Object Systems (MOS 2002), June 2002.
-
(2002)
Proceedings of the 8th ECOOP Workshop on Mobile Object Systems (MOS 2002)
-
-
Kato, K.1
Oyama, Y.2
Kanda, K.3
Matsubara, K.4
-
13
-
-
84987199770
-
A New Dimension for the Unix File System, Software — Practice and Experience
-
Korn, D.G. and Krell, E. : A New Dimension for the Unix File System, Software — Practice and Experience, Vol. 20, No. S1 (1990), pp. 19-34.
-
(1990)
, vol.20
, Issue.S1
, pp. 19-34
-
-
Korn, D.G.1
Krell, E.2
-
14
-
-
0342452552
-
The Safe-Tcl Security Model
-
June
-
Levy, J.Y., Demailly, L., Ousterhout, J.K. and Welch, B.B. : The Safe-Tcl Security Model, Proceedings of the USENIX Annual Technical Conference (NO 98), June 1998.
-
(1998)
Proceedings of the USENIX Annual Technical Conference
, Issue.98
-
-
Levy, J.Y.1
Demailly, L.2
Ousterhout, J.K.3
Welch, B.B.4
-
16
-
-
0010689333
-
The Prospero File System: A Global File System Based on the Virtual System Model
-
Neuman, B.C. : The Prospero File System: A Global File System Based on the Virtual System Model, Computing Systems, Vol. 5, No. 4 (1992), pp. 407-432.
-
(1992)
Computing Systems
, vol.5
, Issue.4
, pp. 407-432
-
-
Neuman, B.C.1
-
18
-
-
0242539799
-
Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
-
September
-
Sekar, R., Ramakrishnan, C.R., Ramakrishnan, I.V. and Smolka, S.A. : Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security, Proceedings of New Security Paradigms Workshop (NSPW '01), pp. 23-30, September 2001.
-
(2001)
Proceedings of New Security Paradigms Workshop (NSPW '01)
, pp. 23-30
-
-
Sekar, R.1
Ramakrishnan, C.R.2
Ramakrishnan, I.V.3
Smolka, S.A.4
-
20
-
-
0032644930
-
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code
-
May-June
-
Takahashi, M., Kono, K. and Masuda, T. : Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code, Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS '99), pp. 64-73, May-June 1999.
-
(1999)
Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS '99)
, pp. 64-73
-
-
Takahashi, M.1
Kono, K.2
Masuda, T.3
-
21
-
-
1642398510
-
-
http://user-mode-linux.sourceforge.net/
-
User-Mode Linux : http://user-mode-linux.sourceforge.net/.
-
User-Mode Linux
-
-
-
22
-
-
85024750497
-
-
http://www.vmware.com/
-
VMware : http://www.vmware.com/.
-
VMware
-
-
|