-
1
-
-
59249108249
-
Watchdogs—Extending the unix file system
-
Spring
-
Bershad, B. N. and Pinkerton, C. B., “Watchdogs—Extending the Unix File System,” Computing Systems, vol. 1, no. 2, pp. 169-88, Spring 1988.
-
(1988)
Computing Systems
, vol.1
, Issue.2
, pp. 169-188
-
-
Bershad, B.N.1
Pinkerton, C.B.2
-
2
-
-
84952081769
-
Unix security myths and truths
-
December
-
Candia, T., “Unix Security Myths and Truths,” EDPACS, vol. 20, no. 6, pp. 8–13, December 1992.
-
(1992)
EDPACS
, vol.20
, Issue.6
, pp. 8-13
-
-
Candia, T.1
-
3
-
-
85080363475
-
New ideas in discretionary access control
-
Portland, OR, USA,. USENIX, August 29–30
-
Carson, M. E. and Wen, Der Jiang, “New Ideas in Discretionary Access Control,” Proceedings: UNIX Security Workshop, Portland, OR, USA, pp. 35–7, USENIX, August 29–30 1988.
-
(1988)
Proceedings: UNIX Security Workshop
, pp. 35-37
-
-
Carson, M.E.1
Wen, D.J.2
-
4
-
-
85080429986
-
-
USENIX, Berkeley, CA, USA
-
Davida, G. I. and Matt, B. J., Unix Guardians: Delegating Security to the User, USENIX, Berkeley, CA, USA, 1988.
-
(1988)
Unix Guardians: Delegating Security to the User
-
-
Davida, G.I.1
Matt, B.J.2
-
6
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
March
-
Dennis, Jack B. and Van Horn, E. C., “Programming Semantics for Multiprogrammed Computations,” Comm. ACM, vol. 9, no. 3, pp. 143–155, March, 1966.
-
(1966)
Comm. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
van Horn, E.C.2
-
7
-
-
31144441107
-
Viral attacks on unix system security
-
San Diego, CA,. USENIX, January 30–February 3
-
Duff, Tom, “Viral Attacks On UNIX System Security,” Proceedings, 1989 Winter USENIX Technical Conference, San Diego, CA, pp. 165–171, USENIX, January 30–February 3, 1989.
-
(1989)
Proceedings, 1989 Winter USENIX Technical Conference
, pp. 165-171
-
-
Duff, T.1
-
8
-
-
60649097500
-
Extending the UnIx protection model with access control lists
-
San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer
-
Fernandez, G. and Allen, L., “Extending the UNIX Protection Model with Access Control Lists,” Proceedings of USENIX, San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer 1988, pp 119–132.
-
(1988)
Proceedings of USENIX
, pp. 119-132
-
-
Fernandez, G.1
Allen, L.2
-
9
-
-
0024089972
-
The confused deputy (or why capabilities might have been invented)
-
October
-
Hardy, N., “The Confused Deputy (or Why Capabilities Might Have Been Invented),” Operating Systems Review, vol. 22, no. 4, pp. 36–8, October 1988.
-
(1988)
Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
10
-
-
0028676265
-
Specifying and checking unix security constraints
-
Winter
-
Heydon, A., and Tygar, J. D., “Specifying and Checking UNIX Security Constraints,” Computing Systems, vol. 7, no. 1, pp. 91–112, Winter 1994.
-
(1994)
Computing Systems
, vol.7
, Issue.1
, pp. 91-112
-
-
Heydon, A.1
Tygar, J.D.2
-
11
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
Howard, John H., Kazar, Michael L., Menees, Sherri G., Nichols, David A., Satyanarayanan, M., Sidebotham, Robert N., West, Michael J., “Scale and Performance in a Distributed File System,” ACM Transactions on Computer Systems, vol. 6, no. 1, pp. 51-88, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-88
-
-
Howard, J.H.1
Kazar, M.L.2
Menees, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Sidebotham, R.N.6
West, M.J.7
-
12
-
-
77954485300
-
Suid and SGID based attacks on unix: A look at one form of the use and abuse of privileges
-
Spring
-
Kaplan, R., “SUID and SGID Based Attacks on UNIX: a Look at One Form of the Use and Abuse of Privileges,” Computer Security Journal, vol. 9, no. 1, pp. 73–7, Spring 1993.
-
(1993)
Computer Security Journal
, vol.9
, Issue.1
, pp. 73-77
-
-
Kaplan, R.1
-
13
-
-
1642325574
-
Strengthening discretionary access controls to inhibit trojan horses and computer viruses
-
San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer
-
Lai, Nick, and Gray, Terence E., “Strengthening Discretionary Access Controls to Inhibit Trojan Horses and Computer Viruses,” Proceedings of USENIX, San Francisco, CA, USA, USENIX Assoc., Berkeley, CA, USA, Summer 1988, pp. 275–86.
-
(1988)
Proceedings of USENIX
, pp. 275-286
-
-
Lai, N.1
Gray, T.E.2
-
15
-
-
84887248704
-
-
reprinted in January
-
reprinted in Operating Systems Review, vol. 8, no. 1, January 1974, pp. 18–24
-
(1974)
Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
17
-
-
0027347896
-
Fine grained object protection in UNIx
-
January
-
Low, Marie Rose, and Christianson, Bruce, “Fine Grained Object Protection in Unix,” Operating Systems Review, vol. 27, no. 1, pp. 33–50, January 1993.
-
(1993)
Operating Systems Review
, vol.27
, Issue.1
, pp. 33-50
-
-
Low, M.R.1
Christianson, B.2
-
19
-
-
85080397552
-
A tour of the internet worm
-
USENIX Assoc., Berkeley, CA, USA
-
Seeley, Don, “A Tour Of the Internet Worm,” Conference Proceedings 1989 USENIX Technical Conference, USENIX Assoc., Berkeley, CA, USA, pp. 287–304.
-
Conference Proceedings 1989 USENIX Technical Conference
, pp. 287-304
-
-
Seeley, D.1
-
20
-
-
79960803264
-
Extended access control in unix system V—ACLS and context
-
Portland, OR, USA,. USENIX Assoc., Berkeley, CA, USA, August 27–28
-
Strack, H., “Extended Access Control in UNIX System V—ACLs and Context,” USENIX Workshop Proceedings on UNIX Security II, Portland, OR, USA, pp. 87–101, USENIX Assoc., Berkeley, CA, USA, August 27–28 1990.
-
(1990)
USENIX Workshop Proceedings on UNIX Security II
, pp. 87-101
-
-
Strack, H.1
-
21
-
-
85080416899
-
-
USENIX Assoc., Berkeley, CA, USA
-
Wichers, D. R., Cook, D. M., Olsson, R. A., Crossley, J., Kerchen P., Levitt, K. N., and Lo, R., PACL’s: An Access Control List Approach to Anti–Viral Security, USENIX Assoc., Berkeley, CA, USA.
-
PACL’s: An Access Control List Approach to Anti–Viral Security
-
-
Wichers, D.R.1
Cook, D.M.2
Olsson, R.A.3
Crossley, J.4
Kerchen, P.5
Levitt, K.N.6
Lo, R.7
-
22
-
-
0027809739
-
Authentication in the TAOS operating system
-
December 5-8
-
Wobber, E., Abadi, M., Burrows, M., and Lampson, B., “Authentication in the TAOS Operating System,” Proceedings of the 14th ACM Symposium on Operating System Principles, December 5-8, 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating System Principles
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|