-
2
-
-
0038516725
-
A generalized framework for access control: An informal description
-
Oct
-
M. D. Abrams, L. J. LaPadula, K. W. Eggers, and I. M. Olson. A generalized framework for access control: An informal description. In Proceedings of the 13th National Computer Security Conference, pages 135–143, Oct. 1990.
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 135-143
-
-
Abrams, M.D.1
LaPadula, L.J.2
Eggers, K.W.3
Olson, I.M.4
-
3
-
-
0003400251
-
-
Technical Report M74-244, The MITRE Corporation, Bedford, MA, May
-
D. E. Bell and L. J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, Bedford, MA, May 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.E.1
La Padula, L.J.2
-
5
-
-
80054992065
-
Extensibility, safety, and performance in the SPIN operating system
-
Copper Mountain, CO, Dec
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, safety, and performance in the SPIN operating system. In Proc. of the 15th ACM Symp. on Operating Systems Principles, pages 267–284, Copper Mountain, CO, Dec. 1995.
-
(1995)
Proc. Of the 15th ACM Symp. Of Operating Systems Principles
, pp. 267-284
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
7
-
-
12444316438
-
Towards a new strategy of OS design
-
Jan
-
M. I. Bushnell. Towards a new strategy of OS design. GNU’s Bulletin, 1(16), Jan. 1994.
-
(1994)
GNU’S Bulletin
, vol.1
, Issue.16
-
-
Bushnell, M.I.1
-
12
-
-
0031542969
-
The flux oskit: A substrate for OS and language research
-
St. Malo, France, Oct
-
B. Ford, G. Back, G. Benson, J. Lepreau, A. Lin, and O. Shivers. The Flux OSKit: A substrate for OS and language research. In Proc. of the 16th ACM Symp. on Operating Systems Principles, pages 38–51, St. Malo, France, Oct. 1997.
-
(1997)
Proc. Of the 16th ACM Symp. Of Operating Systems Principles
, pp. 38-51
-
-
Ford, B.1
Back, G.2
Benson, G.3
Lepreau, J.4
Lin, A.5
Shivers, O.6
-
13
-
-
0005371666
-
Interface and execution models in the fluke kernel
-
Feb
-
B. Ford, M. Hibler, J. Lepreau, R. McGrath, and P. Tullmann. Interface and Execution Models in the Fluke Kernel. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation, pages 101–116, Feb. 1999.
-
(1999)
Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation
, pp. 101-116
-
-
Ford, B.1
Hibler, M.2
Lepreau, J.3
McGrath, R.4
Tullmann, P.5
-
14
-
-
85086058271
-
Microkernels meet recursive virtual machines
-
Oct
-
B. Ford, M. Hibler, J. Lepreau, P. Tullmann, G. Back, and S. Clawson. Microkernels meet recursive virtual machines. In Proceedings of the Symposium on Operating Systems Design and Implementations, pages 137–151, Oct. 1996.
-
(1996)
Proceedings of the Symposium on Operating Systems Design and Implementations
, pp. 137-151
-
-
Ford, B.1
Hibler, M.2
Lepreau, J.3
Tullmann, P.4
Back, G.5
Clawson, S.6
-
20
-
-
84983009748
-
Providing policy-neutral and transparent access control in extensible systems
-
J. Vitek and C. Jensen, editors, Springer-Verlag, June
-
R. Grimm and B. N. Bershad. Providing policy-neutral and transparent access control in extensible systems. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, June 1999.
-
(1999)
Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Volume 1603 of Lecture Notes in Computer Science
-
-
Grimm, R.1
Bershad, B.N.2
-
21
-
-
0024089972
-
The confused deputy
-
Oct
-
N. Hardy. The confused deputy. Operating Systems Review, 22(4):36–38, Oct. 1988.
-
(1988)
Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
26
-
-
0003470642
-
Security architecture for the Internet Protocol
-
Internet Engineering Task Force, Nov
-
S. Kent and R. Atkinson. Security architecture for the Internet Protocol. RFC 2401, Internet Engineering Task Force, Nov. 1998. ftp://ftp.isi.edu/in-notes/rfc2401.txt.
-
(1998)
RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
27
-
-
0002024821
-
VNodes: An architecture for multiple file system types in Sun UNIX
-
Atlanta, GA, June
-
S. R. Kleiman. Vnodes: An architecture for multiple file system types in Sun UNIX. In Proc. of the Summer 1986 USENIX Conf., pages 238–247, Atlanta, GA, June 1986.
-
(1986)
Proc. Of the Summer 1986 USENIX Conf.
, pp. 238-247
-
-
Kleiman, S.R.1
-
28
-
-
0024752925
-
Security in a secure capability-based system
-
Oct
-
C. R. Landau. Security in a secure capability-based system. Operating Systems Review, pages 2–4, Oct. 1989.
-
(1989)
Operating Systems Review
, pp. 2-4
-
-
Landau, C.R.1
-
29
-
-
84984064460
-
Policy/mechanism separation in hydra
-
F., and Unversity of Texas at Austin, Nov. ACM/SIGOPS
-
R. Levin, E. Cohen, W. Corwin, P. F., and W. Wulf. Policy/mechanism separation in hydra. In Proceedings of the Fifth Symposium on Operating Systems Principles, pages 132–140, Unversity of Texas at Austin, Nov. 1975. ACM/SIGOPS.
-
(1975)
Proceedings of the Fifth Symposium on Operating Systems Principles
, pp. 132-140
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Wulf, W.4
-
31
-
-
0042622927
-
-
Open Software Foundation and Carnegie Mellon University, Nov
-
K. Loepere. Mach 3 Kernel Interfaces. Open Software Foundation and Carnegie Mellon University, Nov. 1992.
-
(1992)
Mach 3 Kernel Interfaces
-
-
Loepere, K.1
-
32
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Oct
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998. http://csrc.nist.gov/nissc/1998/proceedings/paperF1.pdf.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
33
-
-
0003418425
-
Internet security association and key management protocol (ISAKMP)
-
Internet Engineering Task Force, Nov
-
D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet security association and key management protocol (ISAKMP). RFC 2408, Internet Engineering Task Force, Nov. 1998. ftp://ftp.isi.edu/in-notes/rfc2408.txt.
-
(1998)
RFC 2408
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
35
-
-
85084163247
-
Providing policy control over object operations in a Mach based system
-
June
-
S. E. Minear. Providing policy control over object operations in a Mach based system. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141–156, June 1995.
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
, pp. 141-156
-
-
Minear, S.E.1
-
36
-
-
85080423532
-
An overview of the Spring system
-
Sun Microsystems, Inc
-
J. G. Mitchell, J. J. Gibbons, G. Hamilton, P. B. Kessler, Y. A. Khalidi, P. Kougiouris, P. W. Madany, M. N. Nelson, M. L. Powell, and S. R. Radia. An overview of the Spring system. In A Spring Collection. Sun Microsystems, Inc., 1994.
-
(1994)
A Spring Collection
-
-
Mitchell, J.G.1
Gibbons, J.J.2
Hamilton, G.3
Kessler, P.B.4
Khalidi, Y.A.5
Kougiouris, P.6
Madany, P.W.7
Nelson, M.N.8
Powell, M.L.9
Radia, S.R.10
-
40
-
-
0022603643
-
Security in KeyKOS
-
Apr
-
S. A. Rajunas, N. Hardy, A. C. Bomberger, W. S. Frantz, and C. R. Landau. Security in KeyKOS. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, pages 78–85, Apr. 1986.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 78-85
-
-
Rajunas, S.A.1
Hardy, N.2
Bomberger, A.C.3
Frantz, W.S.4
Landau, C.R.5
-
43
-
-
0006313917
-
-
DTOS CDRL A019, 2675 Long Lake Rd, Roseville, MN 55113, June
-
Secure Computing Corp. DTOS Generalized Security Policy Specification. DTOS CDRL A019, 2675 Long Lake Rd, Roseville, MN 55113, June 1997. http://www.securecomputing.com/randt/HTML/dtos.html.
-
(1997)
DTOS Generalized Security Policy Specification
-
-
-
44
-
-
77952338485
-
-
CDRL A003, 2675 Long Lake Rd, Roseville, MN 55113, Feb
-
Secure Computing Corp. Assurance in the Fluke Microkernel: Formal Security Policy Model. CDRL A003, 2675 Long Lake Rd, Roseville, MN 55113, Feb. 1999. http://www.cs.utah.edu/flux/flask/.
-
(1999)
Assurance in the Fluke Microkernel: Formal Security Policy Model
-
-
-
46
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
Seattle, WA, Oct. USENIX Assoc
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In Proc. of the Second Symp. on Operating Systems Design and Implementation, pages 213–227, Seattle, WA, Oct. 1996. USENIX Assoc.
-
(1996)
Proc. Of the Second Symp. Of Operating Systems Design and Implementation
, pp. 213-227
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
47
-
-
0041983715
-
-
Technical Report Technical Report MS-CIS-97-04, University of Pennsylvania, Department of Computer and Information Science
-
J. S. Shapiro. EROS: A capability system. Technical Report Technical Report MS-CIS-97-04, University of Pennsylvania, Department of Computer and Information Science, 1997.
-
(1997)
EROS: A Capability System
-
-
Shapiro, J.S.1
-
48
-
-
85024285628
-
An analysis of application specific security policies
-
Oct
-
D. F. Sterne, M. Branstad, B. Hubbard, and B. M. D. Wolcott. An analysis of application specific security policies. In Proceedings of the 14th National Computer Security Conference, pages 25–36, Oct. 1991.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 25-36
-
-
Sterne, D.F.1
Branstad, M.2
Hubbard, B.3
Wolcott, B.M.D.4
-
50
-
-
0031542975
-
Extensible security architectures for Java
-
Oct
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proc. of the 16th ACM Symp. on Operating Systems Principles, pages 116–128, Oct. 1997.
-
(1997)
Proc. Of the 16th ACM Symp. Of Operating Systems Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
|