메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Design of the EROS trusted window system

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING ENVIRONMENTS; COMPUTING SYSTEM; INFORMATION FLOWS; INTERPROCESS COMMUNICATION MECHANISM; MANDATORY ACCESS CONTROL; MICROSOFT WINDOWS; SENSITIVE INFORMATIONS; TRUST ASSUMPTIONS;

EID: 85084163031     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (54)

References (35)
  • 2
    • 0010123121 scopus 로고
    • Reading, Massachusetts
    • Apple Computer. Inside Macintosh. Reading, Massachusetts, 1985.
    • (1985) Inside Macintosh
  • 3
    • 85077741946 scopus 로고    scopus 로고
    • Apple Computer, Inc.
    • Apple Computer. Quartz 2D Reference. Apple Computer, Inc., 2003.
    • (2003) Quartz 2D Reference
  • 7
    • 85077747728 scopus 로고    scopus 로고
    • U.S. Department of Defense Trusted Computer System Evaluation Criteria, 1985
    • U.S. Department of Defense Trusted Computer System Evaluation Criteria, 1985.
  • 9
    • 39049100001 scopus 로고
    • Trusting X: Issues in building trusted X window systems -or- what's not trusted about X?
    • Washington, DC, USA, Oct. A survey of the issues involved in building trusted X systems, especially of the multi-level secure variety
    • J. Epstein and J. Picciotto. Trusting X: Issues in building Trusted X window systems -or- what's not trusted about X? In Proceedings of the 14th Annual National Computer Security Conference, Washington, DC, USA, Oct. 1991. A survey of the issues involved in building trusted X systems, especially of the multi-level secure variety.
    • (1991) Proceedings of the 14th Annual National Computer Security Conference
    • Epstein, J.1    Picciotto, J.2
  • 10
    • 0026281520 scopus 로고
    • A prototype B3 trusted X window system
    • San Antonio, TX, USA, Dec. The architecture for TRW's high assurance multi-level secure X prototype
    • J. Epstein, et al. A prototype B3 Trusted X Window System. In Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1991. The architecture for TRW's high assurance multi-level secure X prototype.
    • (1991) Proceedings of the Seventh Annual Computer Security Applications Conference
    • Epstein, J.1
  • 13
    • 85084159899 scopus 로고    scopus 로고
    • Pragmatic nonblocking synchronization for real-time systems
    • Boston, MA.
    • M. Hohmuth and H. Härtig. Pragmatic nonblocking synchronization for real-time systems. In Proc. 2001 USENIX Annual Technical Conference, pages 217-230, Boston, MA., 2001.
    • (2001) Proc. 2001 USENIX Annual Technical Conference , pp. 217-230
    • Hohmuth, M.1    Härtig, H.2
  • 15
    • 0029463385 scopus 로고
    • System support for openGL direct rendering
    • W. A. Davis and P. Prusinkiewicz, editors Canadian Human-Computer Communications Society
    • M. J. Kilgard, D. Blythe, and D. Hohn. System support for openGL direct rendering. In W. A. Davis and P. Prusinkiewicz, editors, Graphics Interface '95, pages 116-127. Canadian Human-Computer Communications Society, 1995.
    • (1995) Graphics Interface '95 , pp. 116-127
    • Kilgard, M.J.1    Blythe, D.2    Hohn, D.3
  • 16
  • 17
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 19
    • 0013347999 scopus 로고    scopus 로고
    • The PERSEUS system architecture
    • D. Fox, M. Köhntopp, and A. Pfitzmann, editors DuD Fachbeitrge Vieweg Verlag Also available as IBM Research Report RZ 3335 (#93381)
    • B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The PERSEUS system architecture. In D. Fox, M. Köhntopp, and A. Pfitzmann, editors, VIS 2001, Sicherheight in komplexen IT-Infrastrukturen, DuD Fachbeitrge, pages 1-18. Vieweg Verlag, 2001. Also available as IBM Research Report RZ 3335 (#93381).
    • (2001) VIS 2001, Sicherheight in Komplexen IT-Infrastrukturen , pp. 1-18
    • Pfitzmann, B.1    Riordan, J.2    Stüble, C.3    Waidner, M.4    Weber, A.5
  • 20
    • 0026297599 scopus 로고
    • Towards trusted cut and paste in the X window system
    • San Antonio, TX, USA, Dec. A discussion of the security problems associated with cut and paste in multi-level secure versions of X
    • J. Picciotto. Towards trusted cut and paste in the X Window System. In Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1991. A discussion of the security problems associated with cut and paste in multi-level secure versions of X.
    • (1991) Proceedings of the Seventh Annual Computer Security Applications Conference
    • Picciotto, J.1
  • 21
    • 54049104898 scopus 로고
    • A comparison of trusted X security policies, architectures, and interoperability
    • San Antonio, TX, USA, Dec. A survey of interoperability issues among CMWs and the TRW prototype
    • J. Picciotto and J. Epstein. A comparison of Trusted X security policies, architectures, and interoperability. In Proceedings of the Eighth Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1992. A survey of interoperability issues among CMWs and the TRW prototype.
    • (1992) Proceedings of the Eighth Annual Computer Security Applications Conference
    • Picciotto, J.1    Epstein, J.2
  • 22
    • 0021513250 scopus 로고
    • The blit: A multiplexed graphics terminal
    • Oct.
    • R. Pike. The blit: A multiplexed graphics terminal. Bell Labs Tech. J., 63(8, part 2):1607-1631, Oct. 1984.
    • (1984) Bell Labs Tech. J. , vol.63 , Issue.8 , pp. 1607-1631
    • Pike, R.1
  • 26
    • 85077747733 scopus 로고
    • Inter-client communications conventions manual, version 2.0
    • D. Rosenthal. Inter-client Communications Conventions Manual, version 2.0. X Consortium and Sun Microsystems, 1994.
    • (1994) X Consortium and Sun Microsystems
    • Rosenthal, D.1
  • 33
    • 33751037227 scopus 로고
    • Security requirements for system high and compartmented mode workstations
    • The MITRE Corporation, Bedford, MA, USA, Nov. The original requirements for the CMW, including a description of what they expect for Trusted X
    • J. P. L. Woodward. Security requirements for system high and compartmented mode workstations. Technical Report MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87), The MITRE Corporation, Bedford, MA, USA, Nov. 1987. The original requirements for the CMW, including a description of what they expect for Trusted X.
    • (1987) Technical Report MTR 9992, Revision 1 (also Published by the Defense Intelligence Agency as Document DDS-2600-5502-87)
    • Woodward, J.P.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.