-
1
-
-
85091966368
-
Wedge: splitting applications into reduced-privilege compartments
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: splitting applications into reduced-privilege compartments. In 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI’08), pages 309–322, 2008.
-
(2008)
5th USENIX Symposium on Networked Systems Design and Implementation (NSDI’08)
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
3
-
-
33845414042
-
Labels and event processes in the Asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In 20th ACM Symposium on Operating System Principles (SOSP’05), pages 17–30, 2005.
-
(2005)
20th ACM Symposium on Operating System Principles (SOSP’05)
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
4
-
-
70349266256
-
Verifiable functional purity in Java
-
M. Finifter, A. Mettler, N. Sastry, and D. Wagner. Verifiable functional purity in Java. In 15th ACM Conference on Computer and Communications Security (CCS’08), pages 161–174, 2008.
-
(2008)
15th ACM Conference on Computer and Communications Security (CCS’08)
, pp. 161-174
-
-
Finifter, M.1
Mettler, A.2
Sastry, N.3
Wagner, D.4
-
5
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
L. Gong, M. Mueller, and H. Prafullch. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103–112, 1997.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullch, H.3
-
11
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May
-
M. S. Miller. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
-
(2006)
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
-
-
Miller, M. S.1
-
12
-
-
70349127409
-
-
M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized JavaScript (draft), 2008. http://google-caja.googlecode.com/files/caja-spec-2008-06-07.pdf.
-
(2008)
Caja: Safe active content in sanitized JavaScript (draft)
-
-
Miller, M. S.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
13
-
-
0015561577
-
Protection in programming languages
-
J. H. Morris, Jr. Protection in programming languages. Com-mun. ACM, 16(1):15–21, 1973.
-
(1973)
Com-mun. ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris, J. H.1
-
20
-
-
38549137776
-
-
Technical Report HPL-2006-116, HP Laboratories, August 11
-
M. Steigler and M. Miller. How Emily Tamed the Caml. Technical Report HPL-2006-116, HP Laboratories, August 11, 2006.
-
(2006)
How Emily Tamed the Caml
-
-
Steigler, M.1
Miller, M.2
|