-
2
-
-
0004200684
-
Computer security technology planning study
-
James P. Anderson and Co., Fort Washington, PA, USA
-
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, James P. Anderson and Co., Fort Washington, PA, USA, 1972.
-
(1972)
Technical Report ESD-TR-73-51
-
-
Anderson, J.P.1
-
4
-
-
0028732129
-
Email with a mind of its own: The Safe-Tcl language for enabled mail
-
N. S. Borenstein. Email with a mind of its own: The Safe-Tcl language for enabled mail. In ULPAA '94, pages 389-402, 1994.
-
(1994)
ULPAA '94
, pp. 389-402
-
-
Borenstein, N.S.1
-
5
-
-
33947108834
-
ChakraVyuha: A sandbox operating system for the controlled execution of alien code
-
A. Dan, A. Mohindra, R. Ramaswami, and D. Sitaram. ChakraVyuha: A sandbox operating system for the controlled execution of alien code. Technical Report 20742, IBM T. J. Watson Research Center, 1997.
-
(1997)
Technical Report 20742, IBM T. J. Watson Research Center
-
-
Dan, A.1
Mohindra, A.2
Ramaswami, R.3
Sitaram, D.4
-
7
-
-
3643075543
-
Penguin: Java done right
-
F. S. Gallo. Penguin: Java done right. The Perl Journal, 1(2):10-12, 1996.
-
(1996)
The Perl Journal
, vol.1
, Issue.2
, pp. 10-12
-
-
Gallo, F.S.1
-
8
-
-
85084162735
-
A secure environment for untrusted helper applications
-
July
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium, pages 1-14, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 1-14
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
10
-
-
0030674187
-
New security architectural directions for Java
-
February
-
L. Gong. New security architectural directions for Java. In IEEE COMPCON '97, February 1997.
-
(1997)
IEEE COMPCON '97
-
-
Gong, L.1
-
13
-
-
3643060849
-
Flexible control of downloaded executable content
-
IBM T. J. Watson Research Center
-
T. Jaeger, N. Islam, R. Anand, A. Prakash, and J. Liedtke. Flexible control of downloaded executable content. Technical Report RC 20886, IBM T. J. Watson Research Center, 1997.
-
(1997)
Technical Report RC 20886
-
-
Jaeger, T.1
Islam, N.2
Anand, R.3
Prakash, A.4
Liedtke, J.5
-
20
-
-
85077779413
-
A provably secure operating system: The system, its applications, and proofs
-
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proofs. Technical Report CSL-116, SRI International, 1990.
-
(1990)
Technical Report CSL-116, SRI International
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
22
-
-
33749550010
-
-
PhD thesis, University of California, Berkeley Published as Project MAC TR-140, Massachusetts Institute of Technology
-
D. D. Redell. Naming and Protection in Extensible Operating Systems. PhD thesis, University of California, Berkeley, 1974. Published as Project MAC TR-140, Massachusetts Institute of Technology.
-
(1974)
Naming and Protection in Extensible Operating Systems
-
-
Redell, D.D.1
-
23
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
27
-
-
0028380781
-
Authentication in the taos operating system
-
February
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
28
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
June
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17(6):337-345, June 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
|