-
1
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In IEEE Symposium on Security and Privacy, pages 66-77, 1995.
-
(1995)
IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
3
-
-
0010403784
-
Email with a mind of its own: The safe-tcl language for enabled mail
-
anonymous ftp from ics.uci.edu in the file mrose/safe-tcl/safe-tcl.tar.Z
-
N. S. Borenstein. Email with a mind of its own: The Safe-Tcl language for enabled mail. In UL-PAA '94, 1994. Available via anonymous ftp from ics.uci.edu in the file mrose/safe-tcl/safe-tcl.tar.Z.
-
(1994)
UL-PAA '94
-
-
Borenstein, N.S.1
-
4
-
-
0028754363
-
Discretionary access control by means of usage conditions
-
E. Born and H. Stiegler. Discretionary access control by means of usage conditions. Computers & Security, 13(5):437-450, 1994.
-
(1994)
Computers & Security
, vol.13
, Issue.5
, pp. 437-450
-
-
Born, E.1
Stiegler, H.2
-
9
-
-
0024984237
-
An architecture for practical delegation in a distributed system
-
M. Gasser and E. McDermott. An architecture for practical delegation in a distributed system. In IEEE Symposium on Security and Privacy, pages 20-30, 1990.
-
(1990)
IEEE Symposium on Security and Privacy
, pp. 20-30
-
-
Gasser, M.1
McDermott, E.2
-
11
-
-
0030421146
-
Corona: A communication service for scalable, reliable group collaboration systems
-
November To appear
-
R. Hall, A. Mathur, F. Jahanian, A. Prakash, and C. Rasmussen. Corona: A communication service for scalable, reliable group collaboration systems. In Proceedings of the Sixth ACM Conference on Computer-Supported Cooperative Work, November 1996. To appear.
-
(1996)
Proceedings of the Sixth ACM Conference on Computer-Supported Cooperative Work
-
-
Hall, R.1
Mathur, A.2
Jahanian, F.3
Prakash, A.4
Rasmussen, C.5
-
14
-
-
0003899818
-
The kerberos network authentication service
-
September
-
J. T. Kohl and B. C. Neuman. The Kerberos network authentication service. Internet RFC 1510, September, 1993.
-
(1993)
Internet RFC 1510
-
-
Kohl, J.T.1
Neuman, B.C.2
-
17
-
-
0028715549
-
Design for dynamic user-role-based security
-
I. Mohammed and D. M. Dilts. Design for dynamic user-role-based security. Computers & Security, 13(8):661-671, 1994.
-
(1994)
Computers & Security
, vol.13
, Issue.8
, pp. 661-671
-
-
Mohammed, I.1
Dilts, D.M.2
-
21
-
-
0003665362
-
-
revision 1.0 edition, December
-
Open Software Foundation. Introduction to OSF DCE, revision 1.0 edition, December 1992.
-
(1992)
Introduction to OSF DCE
-
-
-
23
-
-
0011800004
-
A secure group membership protocol
-
January
-
M. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31-42, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 31-42
-
-
Reiter, M.1
-
25
-
-
0017930809
-
On digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman. On digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
27
-
-
0024714097
-
Integrating security in a large distributed system
-
August
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, August 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
30
-
-
85077737780
-
Browsing the web safely with domain and type enforcement
-
Abstract for a 5-minute presentation
-
D. F. Sterne, T.V. Benzel, L. Badger, K. M. Walker, K. A. Oostendorp, D. L. Sherman, and M. J. Petkac. Browsing the web safely with Domain and Type Enforcement. In IEEE Symposium on Security and Privacy, 1996. Abstract for a 5-minute presentation.
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Sterne, D.F.1
Benzel, T.V.2
Badger, L.3
Walker, K.M.4
Oostendorp, K.A.5
Sherman, D.L.6
Petkac, M.J.7
-
31
-
-
85077744279
-
Java implementations can allow connections to an arbitrary host
-
Computer Emergency Response Team. Java implementations can allow connections to an arbitrary host. CERT Advisory CA:96:05, 1996. Available at URL ftp://info.cert.org/pub/cert-advisories/CA-96.05.java-applet-security-mgr.
-
(1996)
CERT Advisory CA
, vol.96
, pp. 05
-
-
-
32
-
-
85077760679
-
-
TIS TMACH Edoc-0001-94A edition, August
-
Trusted Information Systems, Inc. Trusted Mach System Architecture, TIS TMACH Edoc-0001-94A edition, August 1994.
-
(1994)
Trusted Mach System Architecture
-
-
-
35
-
-
0028380781
-
Authentication in the taos operating system
-
February
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
36
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
June
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17(6):337-345, June 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
|