-
2
-
-
0001916468
-
Mach: A new kernel foundation for unix development
-
July
-
ACETTA, M. J., BARON, R., BOLOWSKY, W., GOLUB, D., RASHID, R., TEVANIAN, A., AND YOUNG, M. Mach: a new kernel foundation for unix development. In Proceedings of the USENIX 1986 Summer Conference (July 1986), pp. 93–112.
-
(1986)
Proceedings of the USENIX 1986 Summer Conference
, pp. 93-112
-
-
Acetta, M.J.1
Baron, R.2
Bolowsky, W.3
Golub, D.4
Rashid, R.5
Tevanian, A.6
Young, M.7
-
5
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
BITTAU, A., MARCHENKO, P., HANDLEY, M., AND KARP, B. Wedge: Splitting Applications into Reduced-Privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (2008), pp. 309–322.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
6
-
-
0024902190
-
Assurance for the Trusted Mach operating system
-
BRANSTAD, M., AND LANDAUER, J. Assurance for the Trusted Mach operating system. Computer Assurance, 1989. COMPASS ’89,’Systems Integrity, Software Safety and Process Security’, Proceedings of the Fourth Annual Conference on (1989), 103–108.
-
(1989)
Computer Assurance, 1989. COMPASS ’89,’Systems Integrity, Software Safety and Process Security’, Proceedings of the Fourth Annual Conference on
, pp. 103-108
-
-
Branstad, M.1
Landauer, J.2
-
8
-
-
0000715892
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
GONG, L., MUELLER, M., PRAFULLCHANDRA, H., AND SCHEMERS, R. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems.
-
Proceedings of the USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
14
-
-
70349127409
-
-
May
-
MILLER, M. S., SAMUEL, M., LAURIE, B., AWAD, I., AND STAY, M. Caja: Safe active content in sanitized javascript, May 2008. http://google-caja.googlecode.com/files/caja-spec-2008-06-07.pdf.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.S.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
16
-
-
0347229432
-
-
Tech. Rep. Report CSL-116, Computer Science Laboratory, SRI International, May
-
NEUMANN, P. G., BOYER, R. S., GEIERTAG, R. J., LEVITT, K. N., AND ROBINSON, L. A provably secure operating system: The system, its applications, and proofs, second edition. Tech. Rep. Report CSL-116, Computer Science Laboratory, SRI International, May 1980.
-
(1980)
A Provably Secure Operating System: The System, Its Applications, and Proofs, Second Edition
-
-
Neumann, P.G.1
Boyer, R.S.2
Geiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
18
-
-
70349086407
-
Isolating web programs in modern browser architectures
-
New York, NY, USA, ACM
-
REIS, C., AND GRIBBLE, S. D. Isolating web programs in modern browser architectures. In EuroSys’09: Proceedings of the 4th ACM European conference on Computer systems (New York, NY, USA, 2009), ACM, pp. 219–232.
-
(2009)
EuroSys’09: Proceedings of the 4th ACM European Conference on Computer Systems
, pp. 219-232
-
-
Reis, C.1
Gribble, S.D.2
-
19
-
-
19944423977
-
The protection of information in computer systems
-
July
-
SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer systems. In Communications of the ACM (July 1974), vol. 17.
-
(1974)
Communications of the ACM
, vol.17
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
22
-
-
0141492397
-
Overview of the architecture of Distributed Trusted Mach
-
November
-
SEBES, E. J. Overview of the architecture of Distributed Trusted Mach. Proceedings of the USENIX Mach Symposium: November (1991), 20–22.
-
(1991)
Proceedings of the USENIX Mach Symposium
, pp. 20-22
-
-
Sebes, E.J.1
-
24
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
August
-
SPENCER, R., SMALLEY, S., LOSCOCCO, P., HIBLER, M., ANDERSON, D., AND LEPREAU, J. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. 8th USENIX Security Symposium (August 1999).
-
(1999)
Proc. 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
-
27
-
-
50949132744
-
Design and implementation of the TrustedBSD MAC framework
-
IEEE April
-
WATSON, R., FELDMAN, B., MIGUS, A., AND VANCE, C. Design and Implementation of the TrustedBSD MAC Framework. In Proc. Third DARPA Information Survivability Conference and Exhibition (DISCEX), IEEE (April 2003).
-
(2003)
Proc. Third DARPA Information Survivability Conference and Exhibition (DISCEX)
-
-
Watson, R.1
Feldman, B.2
Migus, A.3
Vance, C.4
-
28
-
-
0003744395
-
-
Elsevier North-Holland, Inc., Amsterdam, The Netherlands
-
WILKES, M. V., AND NEEDHAM, R. M. The Cambridge CAP computer and its operating system (Operating and programming systems series). Elsevier North-Holland, Inc., Amsterdam, The Netherlands, 1979.
-
(1979)
The Cambridge CAP Computer and Its Operating System (Operating and Programming Systems Series)
-
-
Wilkes, M.V.1
Needham, R.M.2
|