-
5
-
-
0025443276
-
Compartmented mode workstation: Prototype highlights
-
June
-
J. L. Berger, J. Picciotto, J. P. L. Woodward, and P. T. Cummings. Compartmented mode workstation: Prototype highlights. Software Engineering, 16(6):608–618, June 1990.
-
(1990)
Software Engineering
, vol.16
, Issue.6
, pp. 608-618
-
-
Berger, J.L.1
Picciotto, J.2
Woodward, J.P.L.3
Cummings, P.T.4
-
7
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the USENIX Security Symposium, August 2004.
-
(2004)
Proceedings of the USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
9
-
-
84952323039
-
Issues in building trusted X window systems
-
Fall
-
J. Epstein and J. Picciotto. Issues in building Trusted X Window Systems. The X Resource, 1(1), Fall 1991.
-
(1991)
The X Resource
, vol.1
, Issue.1
-
-
Epstein, J.1
Picciotto, J.2
-
15
-
-
30344471832
-
Will proposed standard make mobile phones more secure?
-
N. Leavitt. Will proposed standard make mobile phones more secure? IEEE Computer, 38(12):20–22, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.12
, pp. 20-22
-
-
Leavitt, N.1
-
20
-
-
0041386047
-
Using handhelds and PCs together
-
November
-
B. A. Myers. Using handhelds and PCs together. Communications of the ACM, 44(11), November 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.11
-
-
Myers, B.A.1
-
23
-
-
0007968045
-
Virtual network computing
-
T. Richardson, Q. Stafford-Fraser, K. R. Wood, and A. Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33–38, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
25
-
-
0036785515
-
A composable framework for secure multi-modal access to internet services from post-PC devices
-
S. J. Ross, J. L. Hill, M. Y. Chen, A. D. Joseph, D. E. Culler, and E. A. Brewer. A composable framework for secure multi-modal access to Internet services from post-PC devices. Mobile Network Applications, 7(5):389–406, 2002.
-
(2002)
Mobile Network Applications
, vol.7
, Issue.5
, pp. 389-406
-
-
Ross, S.J.1
Hill, J.L.2
Chen, M.Y.3
Joseph, A.D.4
Culler, D.E.5
Brewer, E.A.6
-
27
-
-
85080536803
-
The enemy within
-
May
-
J. Scott-Joynt. The enemy within. BBC News, Available at: http://news.bbc.co.uk/2/hi/business/4510561.stm, May 2005.
-
(2005)
BBC News
-
-
Scott-Joynt, J.1
-
28
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
October
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
30
-
-
85080516625
-
-
Technical Report to appear, Intel Research Center
-
R. Sharp, A. Madhavapeddy, R. Want, T. Pering, and J. Light. Fighting crimeware: An architecture for split-trust web applications. Technical Report to appear, Intel Research Center, 2006.
-
(2006)
Fighting Crimeware: An Architecture for Split-Trust Web Applications
-
-
Sharp, R.1
Madhavapeddy, A.2
Want, R.3
Pering, T.4
Light, J.5
-
39
-
-
85080577170
-
-
April
-
The XFree86 project, Inc. http://www.xfree86.org/, April 2006.
-
(2006)
-
-
-
40
-
-
85080541933
-
-
April
-
The X.Org foundation. http://www.x.org/, April 2006.
-
(2006)
-
-
|