메뉴 건너뛰기




Volumn , Issue , 1996, Pages

Building systems that flexibly control downloaded executable content

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SERVICES; NETWORK ARCHITECTURE;

EID: 85084161058     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (36)
  • 3
    • 0010403784 scopus 로고
    • Email with a mind of its own: The safe-tcl language for enabled mail
    • anonymous ftp from ics.uci.edu in the file mrose/safe-tcl/safe-tcl.tar.Z
    • N. S. Borenstein. Email with a mind of its own: The Safe-Tcl language for enabled mail. In UL-PAA '94, 1994. Available via anonymous ftp from ics.uci.edu in the file mrose/safe-tcl/safe-tcl.tar.Z.
    • (1994) UL-PAA '94
    • Borenstein, N.S.1
  • 4
    • 0028754363 scopus 로고
    • Discretionary access control by means of usage conditions
    • E. Born and H. Stiegler. Discretionary access control by means of usage conditions. Computers & Security, 13(5):437-450, 1994.
    • (1994) Computers & Security , vol.13 , Issue.5 , pp. 437-450
    • Born, E.1    Stiegler, H.2
  • 9
    • 0024984237 scopus 로고
    • An architecture for practical delegation in a distributed system
    • M. Gasser and E. McDermott. An architecture for practical delegation in a distributed system. In IEEE Symposium on Security and Privacy, pages 20-30, 1990.
    • (1990) IEEE Symposium on Security and Privacy , pp. 20-30
    • Gasser, M.1    McDermott, E.2
  • 14
    • 0003899818 scopus 로고
    • The kerberos network authentication service
    • September
    • J. T. Kohl and B. C. Neuman. The Kerberos network authentication service. Internet RFC 1510, September, 1993.
    • (1993) Internet RFC 1510
    • Kohl, J.T.1    Neuman, B.C.2
  • 17
    • 0028715549 scopus 로고
    • Design for dynamic user-role-based security
    • I. Mohammed and D. M. Dilts. Design for dynamic user-role-based security. Computers & Security, 13(8):661-671, 1994.
    • (1994) Computers & Security , vol.13 , Issue.8 , pp. 661-671
    • Mohammed, I.1    Dilts, D.M.2
  • 21
    • 0003665362 scopus 로고
    • revision 1.0 edition, December
    • Open Software Foundation. Introduction to OSF DCE, revision 1.0 edition, December 1992.
    • (1992) Introduction to OSF DCE
  • 23
    • 0011800004 scopus 로고    scopus 로고
    • A secure group membership protocol
    • January
    • M. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31-42, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 31-42
    • Reiter, M.1
  • 25
    • 0017930809 scopus 로고
    • On digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman. On digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 27
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • August
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, August 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 31
    • 85077744279 scopus 로고    scopus 로고
    • Java implementations can allow connections to an arbitrary host
    • Computer Emergency Response Team. Java implementations can allow connections to an arbitrary host. CERT Advisory CA:96:05, 1996. Available at URL ftp://info.cert.org/pub/cert-advisories/CA-96.05.java-applet-security-mgr.
    • (1996) CERT Advisory CA , vol.96 , pp. 05
  • 32
    • 85077760679 scopus 로고
    • TIS TMACH Edoc-0001-94A edition, August
    • Trusted Information Systems, Inc. Trusted Mach System Architecture, TIS TMACH Edoc-0001-94A edition, August 1994.
    • (1994) Trusted Mach System Architecture


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.