-
1
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Mar
-
Dennis, J., and VanHorn, E. Programming semantics for multiprogrammed computations. Communications of the ACM, 9:143–155, Mar. 1966.
-
(1966)
Communications of the ACM
, vol.9
, pp. 143-155
-
-
Dennis, J.1
VanHorn, E.2
-
2
-
-
85084161648
-
Confining root programs with domain and type enforcement (DTE)
-
Jul
-
Walker, K., Sterne, D., Badger, L., Petkac, M., Shermann, D., and Oostendorp, K. Confining root programs with domain and type enforcement (DTE). In Proceedings of the Sixth USENIX Security Symposium, Jul. 1996.
-
(1996)
Proceedings of the Sixth USENIX Security Symposium
-
-
Walker, K.1
Sterne, D.2
Badger, L.3
Petkac, M.4
Shermann, D.5
Oostendorp, K.6
-
4
-
-
0016555241
-
The protection of information in computer systems
-
Sep
-
Saltzer, J., and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278–1308, Sep. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
6
-
-
0036117258
-
A scheduling scheme for controlling allocation of cpu resources for mobile programs
-
Mar
-
Lal, M., and Pandey, R. A scheduling scheme for controlling allocation of cpu resources for mobile programs. Autonomous Agents and Multi-Agent Systems, 5(1):7–43, Mar. 2002.
-
(2002)
Autonomous Agents and Multi-Agent Systems
, vol.5
, Issue.1
, pp. 7-43
-
-
Lal, M.1
Pandey, R.2
-
7
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2
-
Dec
-
Gong, L., Mueller, M., Prafullchandra, H., and Schemers, R. Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
10
-
-
85084162735
-
A secure environment for untrusted helper applications (confining the wily hacker)
-
Jul
-
Goldberg, I., Wagner, D., Thomas, R., and Brewer, E. A secure environment for untrusted helper applications (confining the wily hacker). In Proceedings of the Sixth USENIX Security Symposium, Jul. 1996.
-
(1996)
Proceedings of the Sixth USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
15
-
-
0031332426
-
Using kernel hypervisors to secure applications
-
Dec
-
Mitchem, T., Lu, R., and O’Brien, R. Using kernel hypervisors to secure applications. In Proceedings, 13th Annual Computer Security Applications Conference, Dec. 1997.
-
(1997)
Proceedings, 13th Annual Computer Security Applications Conference
-
-
Mitchem, T.1
Lu, R.2
O’Brien, R.3
-
16
-
-
33947108834
-
-
Technical Report 20742, IBM T.J. Watson Research Center
-
Dan, A., Mohindra, A., Ramaswami, R., and Sitaram, D. Chakravyuha (CV): A sandbox operating system environment for controlled execution of alien code. Technical Report 20742, IBM T.J. Watson Research Center, 1997.
-
(1997)
Chakravyuha (CV): A Sandbox Operating System Environment for Controlled Execution of Alien Code
-
-
Dan, A.1
Mohindra, A.2
Ramaswami, R.3
Sitaram, D.4
|