메뉴 건너뛰기




Volumn , Issue , 1995, Pages

TRON: Process–specific file protection for the UNIX operating system

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SOFTWARE TESTING;

EID: 85084161168     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (55)

References (22)
  • 1
    • 59249108249 scopus 로고
    • Watchdogs—Extending the unix file system
    • Spring
    • Bershad, B. N. and Pinkerton, C. B., “Watchdogs—Extending the Unix File System,” Computing Systems, vol. 1, no. 2, pp. 169-88, Spring 1988.
    • (1988) Computing Systems , vol.1 , Issue.2 , pp. 169-188
    • Bershad, B.N.1    Pinkerton, C.B.2
  • 2
    • 84952081769 scopus 로고
    • Unix security myths and truths
    • December
    • Candia, T., “Unix Security Myths and Truths,” EDPACS, vol. 20, no. 6, pp. 8–13, December 1992.
    • (1992) EDPACS , vol.20 , Issue.6 , pp. 8-13
    • Candia, T.1
  • 3
    • 85080363475 scopus 로고
    • New ideas in discretionary access control
    • Portland, OR, USA,. USENIX, August 29–30
    • Carson, M. E. and Wen, Der Jiang, “New Ideas in Discretionary Access Control,” Proceedings: UNIX Security Workshop, Portland, OR, USA, pp. 35–7, USENIX, August 29–30 1988.
    • (1988) Proceedings: UNIX Security Workshop , pp. 35-37
    • Carson, M.E.1    Wen, D.J.2
  • 5
  • 6
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • March
    • Dennis, Jack B. and Van Horn, E. C., “Programming Semantics for Multiprogrammed Computations,” Comm. ACM, vol. 9, no. 3, pp. 143–155, March, 1966.
    • (1966) Comm. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    van Horn, E.C.2
  • 7
    • 31144441107 scopus 로고
    • Viral attacks on unix system security
    • San Diego, CA,. USENIX, January 30–February 3
    • Duff, Tom, “Viral Attacks On UNIX System Security,” Proceedings, 1989 Winter USENIX Technical Conference, San Diego, CA, pp. 165–171, USENIX, January 30–February 3, 1989.
    • (1989) Proceedings, 1989 Winter USENIX Technical Conference , pp. 165-171
    • Duff, T.1
  • 8
    • 60649097500 scopus 로고
    • Extending the UnIx protection model with access control lists
    • San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer
    • Fernandez, G. and Allen, L., “Extending the UNIX Protection Model with Access Control Lists,” Proceedings of USENIX, San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer 1988, pp 119–132.
    • (1988) Proceedings of USENIX , pp. 119-132
    • Fernandez, G.1    Allen, L.2
  • 9
    • 0024089972 scopus 로고
    • The confused deputy (or why capabilities might have been invented)
    • October
    • Hardy, N., “The Confused Deputy (or Why Capabilities Might Have Been Invented),” Operating Systems Review, vol. 22, no. 4, pp. 36–8, October 1988.
    • (1988) Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 10
    • 0028676265 scopus 로고
    • Specifying and checking unix security constraints
    • Winter
    • Heydon, A., and Tygar, J. D., “Specifying and Checking UNIX Security Constraints,” Computing Systems, vol. 7, no. 1, pp. 91–112, Winter 1994.
    • (1994) Computing Systems , vol.7 , Issue.1 , pp. 91-112
    • Heydon, A.1    Tygar, J.D.2
  • 12
    • 77954485300 scopus 로고
    • Suid and SGID based attacks on unix: A look at one form of the use and abuse of privileges
    • Spring
    • Kaplan, R., “SUID and SGID Based Attacks on UNIX: a Look at One Form of the Use and Abuse of Privileges,” Computer Security Journal, vol. 9, no. 1, pp. 73–7, Spring 1993.
    • (1993) Computer Security Journal , vol.9 , Issue.1 , pp. 73-77
    • Kaplan, R.1
  • 13
    • 1642325574 scopus 로고
    • Strengthening discretionary access controls to inhibit trojan horses and computer viruses
    • San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer
    • Lai, Nick, and Gray, Terence E., “Strengthening Discretionary Access Controls to Inhibit Trojan Horses and Computer Viruses,” Proceedings of USENIX, San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer 1988, pp. 275–86.
    • (1988) Proceedings of USENIX , pp. 275-286
    • Lai, N.1    Gray, T.E.2
  • 15
    • 84887248704 scopus 로고
    • reprinted in January
    • reprinted in Operating Systems Review, vol. 8, no. 1, January 1974, pp. 18–24
    • (1974) Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 17
    • 0027347896 scopus 로고
    • Fine grained object protection in UNIx
    • January
    • Low, Marie Rose, and Christianson, Bruce, “Fine Grained Object Protection in Unix,” Operating Systems Review, vol. 27, no. 1, pp. 33–50, January 1993.
    • (1993) Operating Systems Review , vol.27 , Issue.1 , pp. 33-50
    • Low, M.R.1    Christianson, B.2
  • 20
    • 79960803264 scopus 로고
    • Extended access control in unix system V—ACLS and context
    • Portland, OR, USA,. USENIX Assoc., Berkeley, CA, USA, August 27–28
    • Strack, H., “Extended Access Control in UNIX System V—ACLs and Context,” USENIX Workshop Proceedings on UNIX Security II, Portland, OR, USA, pp. 87–101, USENIX Assoc., Berkeley, CA, USA, August 27–28 1990.
    • (1990) USENIX Workshop Proceedings on UNIX Security II , pp. 87-101
    • Strack, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.