메뉴 건너뛰기




Volumn , Issue , 1996, Pages

A secure environment for untrusted helper applications confining the wily hacker

Author keywords

[No Author keywords available]

Indexed keywords

PERSONAL COMPUTING;

EID: 85084162735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (355)

References (36)
  • 7
    • 85084161168 scopus 로고
    • TRON: Process-specific file protection for the UNIX operating system
    • USENIX Assoc
    • Andrew Berman, Virgil Bourassa, and Erik Selberg. TRON: Process-specific file protection for the UNIX operating system. In Proc. 1995 USENIX Winter Technical Conference, pages 165-175. USENIX Assoc, 1995.
    • (1995) Proc. 1995 USENIX Winter Technical Conference , pp. 165-175
    • Berman, A.1    Bourassa, V.2    Selberg, E.3
  • 18
    • 85077748869 scopus 로고    scopus 로고
    • Frederick Cohen. Personal communication
    • Frederick Cohen. Personal communication.
  • 21
    • 85077743314 scopus 로고
    • September Announced on the Internet.
    • Ray Cromwell. Buffer overflow, September 1995. Announced on the Internet. http://www.c2.net/hacknetscape/.
    • (1995) Buffer Overflow
    • Cromwell, R.1
  • 23
    • 60649097500 scopus 로고
    • Extending the unix protection model with access control lists
    • USENIX Assoc
    • G. Fernandez and L. Allen. Extending the Unix protection model with access control lists. In Proc. Summer 1988 USENIX Conference, pages 119-132. USENIX Assoc, 1988.
    • (1988) Proc. Summer 1988 USENIX Conference , pp. 119-132
    • Fernandez, G.1    Allen, L.2
  • 28
    • 1642325574 scopus 로고
    • Strengthening discretionary access controls to inhibit trojan horses and computer viruses
    • USENIX Assoc
    • Nick Lai and Terence Gray. Strengthening discretionary access controls to inhibit Trojan horses and computer viruses. In Proc. Summer 1988 USENIX Conference, pages 275-286. USENIX Assoc, 1988.
    • (1988) Proc. Summer 1988 USENIX Conference , pp. 275-286
    • Lai, N.1    Gray, T.2
  • 30
    • 0005076594 scopus 로고
    • Restricting network access to system daemons under SunOS
    • USENIX Assoc
    • William LeFebvre. Restricting network access to system daemons under SunOS. In UNIX Security Symposium III Proceedings, pages 93-103. USENIX Assoc, 1992.
    • (1992) UNIX Security Symposium III Proceedings , pp. 93-103
    • LeFebvre, W.1
  • 31
    • 85077746029 scopus 로고    scopus 로고
    • X11R6 source
    • Davor Matic. Xnest. Available in the X11R6 source. Also ftp://ftp.cs.umass.edu/pub/rcf/exp/X11R6/xc/programs/Xserver/hw/xnest.
    • Xnest
    • Matic, D.1
  • 34
    • 85077734987 scopus 로고
    • August Post to bugtraq mailing list.
    • Jeff Uphoff. Re: Guidelines on cgi-bin scripts, August 1995. Post to bugtraq mailing list. http://www.eecs.nwu.edu/cgi-bin/mfs/files2/jmyers/public-html/bugtraq/0166.html?30#mfs.
    • (1995) Re: Guidelines on Cgi-bin Scripts
    • Uphoff, J.1
  • 36
    • 85077757381 scopus 로고
    • March Post to bugtraq mailing list.
    • Christian Wettergren. Re: Mime question⋯, March 1995. Post to bugtraq mailing list. http://www.eecs.nwu.edu/cgi-bin/mfs/files2/jmyers/public-html/bugtraq/1995a/0759.html?30#mfs.
    • (1995) Re: Mime Question⋯
    • Wettergren, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.