-
1
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
June
-
Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghighat. A Domain and Type Enforcement UNIX Prototype. In Proceedings of the 5th USENIX Security Symposium, pages 127-140, June 1995.
-
(1995)
Proceedings of the 5th USENIX Security Symposium
, pp. 127-140
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
7
-
-
0003247354
-
DEFLATE compressed data format specification version 1.3
-
P. Deutsch. DEFLATE Compressed Data Format Specification version 1.3. RFC 1951, 1996.
-
(1996)
RFC 1951
-
-
Deutsch, P.1
-
8
-
-
0003247354
-
ZLIB compressed data format specification version 3.3
-
P. Deutsch and J-L. Gailly. ZLIB Compressed Data Format Specification version 3.3. RFC 1950, 1996.
-
(1996)
RFC 1950
-
-
Deutsch, P.1
Gailly, J.-L.2
-
11
-
-
84887507059
-
Going beyond the sandbox: An overview of the new SecurityArchitecture in the Java development kit 1.2
-
Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers. Going Beyond the Sandbox: An Overview of the New SecurityArchitecture in the Java Development Kit 1.2. USENIX Symposium on Internet Technologies and Systems, pages 103-112, 1997.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
15
-
-
0017240454
-
Operating system structures to support securityand reliable software
-
Theodore A. Linden. Operating System Structures to Support Securityand Reliable Software. ACM Computing Surveys, 8(4):409-445, 1976.
-
(1976)
ACM Computing Surveys
, vol.8
, Issue.4
, pp. 409-445
-
-
Linden, T.A.1
-
16
-
-
85077760372
-
XDR: External data representation
-
June
-
Sun Microsystems. XDR: External Data Representation. RFC 1014, June 1987.
-
(1987)
RFC 1014
-
-
-
22
-
-
0016081584
-
Protection and the control of information in multics
-
July
-
Jerome H. Saltzer. Protection and the Control of Information in Multics. Communications of the ACM, 17(7):388-402, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
23
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 69, number 9, pages 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE 69
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
27
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
February
-
David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 3-17, February 2000.
-
(2000)
Proceedings of the ISOC Symposium on Network and Distributed System Security
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
29
-
-
85084161648
-
Confining root programs with domain and type enforcement (DTE)
-
July
-
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Shermann, and Karen A. Oostendorp. Confining Root Programs with Domain and Type Enforcement (DTE). In Proceedings of the 6th Usenix Security Symposium, July 1996.
-
(1996)
Proceedings of the 6th Usenix Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Lee Badger, M.3
Petkac, M.J.4
Shermann, D.L.5
Oostendorp, K.A.6
-
30
-
-
0031542975
-
Extensible security architectures for Java
-
Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten. Extensible Security Architectures for Java. 16h Symposium on Operating System Principles, pages 116-128, 1997.
-
(1997)
16h Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
|