-
1
-
-
85077788181
-
-
Apple Computer, Inc
-
Kernel Authorization. Technical Note TN2127, Apple Computer, Inc., 2007. http://developer.apple.com/technotes/ tn2005/tn2127.html.
-
(2007)
Technical Note TN2127
-
-
-
2
-
-
0003513832
-
Security analysis and enhancements of computer operating systems
-
National Bureau of Standards, April
-
R. P. Abbott, J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tokubo, and D. A. Webb. Security Analysis and Enhancements of Computer Operating Systems. Technical Report NBSIR 76-1041, National Bureau of Standards, April 1976.
-
(1976)
Technical Report NBSIR 76-1041
-
-
Abbott, R.P.1
Chin, J.S.2
Donnelley, J.E.3
Konigsford, W.L.4
Tokubo, S.5
Webb, D.A.6
-
3
-
-
0001916468
-
-
Technical report, August
-
M. Accetta, R. Baron, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A New Kernel Foundation for UNIX Development. Technical report, August 1986.
-
(1986)
Mach: A New Kernel Foundation for UNIX Development
-
-
Accetta, M.1
Baron, R.2
Golub, D.3
Rashid, R.4
Tevanian, A.5
Young, M.6
-
4
-
-
0004200684
-
-
Technical report, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730, October
-
James P. Anderson. Computer Security Technology Planning Study. Technical report, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730, October 1972.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
5
-
-
84976735452
-
-
Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, May
-
Richard Bisbey and Dennis Hollingworth. Protection Analysis: Final Report. Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, May 1978.
-
(1978)
Protection Analysis: Final Report
-
-
Bisbey, R.1
Hollingworth, D.2
-
6
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
Matt Bishop and Michael Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131–152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
8
-
-
85084164657
-
Fixing races for fun and profit: How to use access(2)
-
August
-
Drew Dean and Alan J. Hu. Fixing Races for Fun and Profit: How to use access(2). In Proc. 13th USENIX Security Symposium, August 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
-
-
Dean, D.1
Hu, A.J.2
-
9
-
-
85077797680
-
Kauth: Kernel authorization framework
-
January
-
Elad Efrat. kauth: kernel authorization framework. In NetBSD Kernel Developer’s Manual. January 2007. http://www.netbsd.org/ ~elad/recent/man/kauth.9.html.
-
(2007)
NetBSD Kernel Developer’s Manual
-
-
Efrat, E.1
-
10
-
-
85077791485
-
Follow the rules regarding concurrency management
-
October
-
William L. Fithen. Follow the Rules Regarding Concurrency Management. BuildSecurityIn, October 2005. https://buildsecurityin.us-cert.gov/daisy/bsi/articles/ knowledge/guidelines/332.html.
-
(2005)
BuildSecurityIn
-
-
Fithen, W.L.1
-
14
-
-
2642570168
-
Traps and pitfalls: Practical problems in in system call interposition based security tools
-
February
-
Tal Garfinkel. Traps and Pitfalls: Practical Problems in in System Call Interposition Based Security Tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
-
19
-
-
85077798819
-
-
Todd C. Miller. Sudo, 2007. http://www.gratisoft.us/sudo/.
-
(2007)
Sudo
-
-
Miller, T.C.1
-
20
-
-
84878346861
-
Improving host security with system call policies
-
Washington, DC, August
-
Niels Provos. Improving Host Security with System Call Policies. In Proc. 12th USENIX Security Symposium, Washington, DC, August 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
-
-
Provos, N.1
-
22
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
August
-
Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Anderson, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. 8th USENIX Security Symposium, August 1999.
-
(1999)
Proc. 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
-
23
-
-
50949132744
-
Design and implementation of the TrustedBSD MAC framework
-
IEEE, April
-
Robert Watson, Brian Feldman, Adam Migus, and Chris Vance. Design and Implementation of the TrustedBSD MAC Framework. In Proc. Third DARPA Information Survivability Conference and Exhibition (DISCEX), IEEE, April 2003.
-
(2003)
Proc. Third DARPA Information Survivability Conference and Exhibition (DISCEX)
-
-
Watson, R.1
Feldman, B.2
Migus, A.3
Vance, C.4
-
24
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
August
-
Chris Wright, Crispan Cowan, James Morris, Stephen Smalley, and Greg Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proc. 11th USENIX Security Symposium, August 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
|