-
1
-
-
85077688694
-
ISO/IEC 15408 - Common criteria for information technology security evaluation
-
May
-
ISO/IEC 15408 - Common Criteria for Information Technology Security Evaluation. Technical Report CCIB-98-026, May 1998.
-
(1998)
Technical Report CCIB-98-026
-
-
-
3
-
-
0033903324
-
Welcome to the opportunities of binary translation
-
March
-
E. R. Altman, D. Kaeli, and Y. Sheffer. Welcome to the Opportunities of Binary Translation. IEEE Computer, 33(3):40-45, March 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.3
, pp. 40-45
-
-
Altman, E.R.1
Kaeli, D.2
Sheffer, Y.3
-
4
-
-
0004200684
-
Computer security technology planning study
-
Hanscom AFB, Bedford, MA Also available as DITCAD-758206 DITCAD-772806
-
J. P. Anderson. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206. Vol. II, DITCAD-772806).
-
(1972)
Technical Report ESD-TR-73-51, Air Force Electronic Systems Division
, vol.1-2
-
-
Anderson, J.P.1
-
5
-
-
0016873760
-
Penetrating an operating system: A study of VM/370 integrity
-
C. Attanasio, P. Markenstein, and R. J. Phillips. Penetrating an Operating System: a Study of VM/370 Integrity. IBM Systems Journal, 15(1):102-116, 1976.
-
(1976)
IBM Systems Journal
, vol.15
, Issue.1
, pp. 102-116
-
-
Attanasio, C.1
Markenstein, P.2
Phillips, R.J.3
-
6
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE Corp., Bedford, MA
-
D. E. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, MITRE Corp., Bedford, MA, 1973.
-
(1973)
Technical Report M74-244
-
-
Bell, D.E.1
LaPadula, L.2
-
7
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corp.
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, MITRE Corp., 1977.
-
(1977)
Technical Report ESD-TR-76-372
-
-
Biba, K.J.1
-
8
-
-
0031269854
-
Disco: Running commodity operating systems on scaleable multiprocessors
-
November
-
E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running Commodity Operating Systems on Scaleable Multiprocessors. ACM Transactions on Computer Systems, 15(4):412-447, November 1997.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 412-447
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
9
-
-
85072542009
-
A security retrofit fo vm/370
-
R. E. Merwin, editor New York, NY, June AFIPS
-
B. Gold, R. Linde, R. J. Peller, M. Schaefer, J. Scheid, and P. D. Ward. A security retrofit fo vm/370. In R. E. Merwin, editor, National Computer Conference, Volume 48, pages 335-344, New York, NY, June 1979. AFIPS.
-
(1979)
National Computer Conference
, vol.48
, pp. 335-344
-
-
Gold, B.1
Linde, R.2
Peller, R.J.3
Schaefer, M.4
Scheid, J.5
Ward, P.D.6
-
10
-
-
0021197578
-
KVM/370 in retrospect
-
Oakland, CA, April IEEE Computer Society Press
-
B. Gold, R. R. Linde, and P. F. Cudney. KVM/370 in Retrospect. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 13-23, Oakland, CA, April 1984. IEEE Computer Society Press.
-
(1984)
Proceedings of the 1984 IEEE Symposium on Security and Privacy
, pp. 13-23
-
-
Gold, B.1
Linde, R.R.2
Cudney, P.F.3
-
11
-
-
84855544565
-
Vm/370 security retrofit program
-
Seattle, WA, October A.C.M.
-
B. Gold, R. R. Linde, M. Schaefer, and J. F. Scheid. Vm/370 security retrofit program. In Proceedings 1977 Annual Conference, pages 411-418, Seattle, WA, October 1977. A.C.M.
-
(1977)
Proceedings 1977 Annual Conference
, pp. 411-418
-
-
Gold, B.1
Linde, R.R.2
Schaefer, M.3
Scheid, J.F.4
-
17
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
November
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A Retrospective on the VAX VMM Security Kernel. Transactions on Software Engineering, 17(11):1147-1165, November 1991.
-
(1991)
Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
19
-
-
85077711761
-
-
July
-
K. Lawton. http://www.bochs.com, July 1999.
-
(1999)
-
-
Lawton, K.1
-
21
-
-
84879848814
-
Application and analysis of the virtual Machine approach to information system security
-
Boston, MA, March A.C.M.
-
S. E. Madnick and J. J. Donavan. Application and Analysis of the Virtual Machine Approach to Information System Security. In ACM SIGARCH-SYSOPS Workshop on Virtual Computer Systems, pages 210-224, Boston, MA, March 1973. A.C.M.
-
(1973)
ACM SIGARCH-SYSOPS Workshop on Virtual Computer Systems
, pp. 210-224
-
-
Madnick, S.E.1
Donavan, J.J.2
-
24
-
-
15944378656
-
-
CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May
-
National Computer Security Center. Final Evaluation Report of HFSIXTS-200, CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May 1992.
-
(1992)
Final Evaluation Report of HFSIXTS-200
-
-
-
28
-
-
0016082273
-
Formal requirements for virtualizable 3rd generation architectures
-
G. Popek and R. Goldberg. Formal Requirements for Virtualizable 3rd Generation Architectures. Communications of the A.C.M., 17(7):412-421, 1974.
-
(1974)
Communications of the A.C.M.
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.1
Goldberg, R.2
-
29
-
-
0024612211
-
Mach: A system software kernel
-
San Francisco, CA, February IEEE Computer Society Press
-
R. Rashid, D. Julin, D. Orr, R. Sanzi, R. Baron, A. Forin, D. Golub, and M. Jones. Mach: A system software kernel. In Proceedings of the 34th Computer Society International Conference COM-PCON 89, San Francisco, CA, February 1989. IEEE Computer Society Press.
-
(1989)
Proceedings of the 34th Computer Society International Conference COM-PCON 89
-
-
Rashid, R.1
Julin, D.2
Orr, D.3
Sanzi, R.4
Baron, R.5
Forin, A.6
Golub, D.7
Jones, M.8
-
32
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
33
-
-
84958951541
-
Program confinement in KVM/370
-
Seattle, WA, October A.C.M.
-
M. Schaefer and B. Gold. Program Confinement in KVM/370. In Proceedings 1977 Annual Conference, pages 404-410, Seattle, WA, October 1977. A.C.M.
-
(1977)
Proceedings 1977 Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
-
34
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
M. D. Schroeder and J. H. Saltzer. A Hardware Architecture for Implementing Protection Rings. Comm. A.C.M., 15(3):157-170, 1972.
-
(1972)
Comm. A.C.M.
, vol.15
, Issue.3
, pp. 157-170
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
35
-
-
0029210672
-
The intel 80 × 86 processor architecture: Pitfalls for secure systems
-
Oakland, CA, May IEEE Computer Society Press
-
O. Sibert, P. A. Porras, and R. Lindell. The Intel 80 × 86 Processor Architecture: Pitfalls for Secure Systems. In Proceedings 1995 IEEE Symposium on Security and Privacy, pages 211-222, Oakland, CA, May 1995. IEEE Computer Society Press.
-
(1995)
Proceedings 1995 IEEE Symposium on Security and Privacy
, pp. 211-222
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
37
-
-
85077724019
-
-
June
-
Wine. http://www.winehq.com, June 2000.
-
(2000)
-
-
|