-
2
-
-
0010123121
-
-
Reading, Massachusetts
-
Apple Computer. Inside Macintosh. Reading, Massachusetts, 1985.
-
(1985)
Inside Macintosh
-
-
-
3
-
-
85077741946
-
-
Apple Computer, Inc.
-
Apple Computer. Quartz 2D Reference. Apple Computer, Inc., 2003.
-
(2003)
Quartz 2D Reference
-
-
-
4
-
-
0025443276
-
Compartmented mode workstation: Prototype highlights
-
June
-
J. L. Berger, J. Picciotto, J. P. L. Woodward, and P. T. Cummings. Compartmented mode workstation: Prototype highlights. IEEE Transactions on Software Engineering, 16(6):608-618, June 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 608-618
-
-
Berger, J.L.1
Picciotto, J.2
Woodward, J.P.L.3
Cummings, P.T.4
-
5
-
-
0024898015
-
Lightweight remote procedure call
-
Dec.
-
B. Bershad, T. Anderson, E. Lazowska, and H. Levy. Lightweight remote procedure call. In Proc. 12th Symposium on Operating Systems Principles, pages 102-113, Dec. 1989.
-
(1989)
Proc. 12th Symposium on Operating Systems Principles
, pp. 102-113
-
-
Bershad, B.1
Anderson, T.2
Lazowska, E.3
Levy, H.4
-
6
-
-
85084163882
-
Security in plan 9
-
San Francisco
-
R. Cox, E. Grosse, R. Pike, D. Presotto, and S. Quinlan. Security in plan 9. In Proceedings of the 11th USENIX Security Symposium, pages 3-16, San Francisco, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 3-16
-
-
Cox, R.1
Grosse, E.2
Pike, R.3
Presotto, D.4
Quinlan, S.5
-
7
-
-
85077747728
-
-
U.S. Department of Defense Trusted Computer System Evaluation Criteria, 1985
-
U.S. Department of Defense Trusted Computer System Evaluation Criteria, 1985.
-
-
-
-
8
-
-
84974757646
-
A high-assurance window system prototype
-
J. Epstein, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Dancer, C. R. Martin, M. Branstad, G. Benson, and D. Rothnie. A high-assurance window system prototype. Journal of Computer Security, 2(2):159-190, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
, pp. 159-190
-
-
Epstein, J.1
McHugh, J.2
Orman, H.3
Pascale, R.4
Marmor-Squires, A.5
Dancer, B.6
Martin, C.R.7
Branstad, M.8
Benson, G.9
Rothnie, D.10
-
9
-
-
39049100001
-
Trusting X: Issues in building trusted X window systems -or- what's not trusted about X?
-
Washington, DC, USA, Oct. A survey of the issues involved in building trusted X systems, especially of the multi-level secure variety
-
J. Epstein and J. Picciotto. Trusting X: Issues in building Trusted X window systems -or- what's not trusted about X? In Proceedings of the 14th Annual National Computer Security Conference, Washington, DC, USA, Oct. 1991. A survey of the issues involved in building trusted X systems, especially of the multi-level secure variety.
-
(1991)
Proceedings of the 14th Annual National Computer Security Conference
-
-
Epstein, J.1
Picciotto, J.2
-
10
-
-
0026281520
-
A prototype B3 trusted X window system
-
San Antonio, TX, USA, Dec. The architecture for TRW's high assurance multi-level secure X prototype
-
J. Epstein, et al. A prototype B3 Trusted X Window System. In Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1991. The architecture for TRW's high assurance multi-level secure X prototype.
-
(1991)
Proceedings of the Seventh Annual Computer Security Applications Conference
-
-
Epstein, J.1
-
11
-
-
0005785915
-
Web spoofing: An internet con game
-
Baltimore, Maryland, Oct.
-
E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach. Web spoofing: An internet con game. In 20th National Information Systems Security Conference, Baltimore, Maryland, Oct. 1997.
-
(1997)
20th National Information Systems Security Conference
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
13
-
-
85084159899
-
Pragmatic nonblocking synchronization for real-time systems
-
Boston, MA.
-
M. Hohmuth and H. Härtig. Pragmatic nonblocking synchronization for real-time systems. In Proc. 2001 USENIX Annual Technical Conference, pages 217-230, Boston, MA., 2001.
-
(2001)
Proc. 2001 USENIX Annual Technical Conference
, pp. 217-230
-
-
Hohmuth, M.1
Härtig, H.2
-
15
-
-
0029463385
-
System support for openGL direct rendering
-
W. A. Davis and P. Prusinkiewicz, editors Canadian Human-Computer Communications Society
-
M. J. Kilgard, D. Blythe, and D. Hohn. System support for openGL direct rendering. In W. A. Davis and P. Prusinkiewicz, editors, Graphics Interface '95, pages 116-127. Canadian Human-Computer Communications Society, 1995.
-
(1995)
Graphics Interface '95
, pp. 116-127
-
-
Kilgard, M.J.1
Blythe, D.2
Hohn, D.3
-
17
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
19
-
-
0013347999
-
The PERSEUS system architecture
-
D. Fox, M. Köhntopp, and A. Pfitzmann, editors DuD Fachbeitrge Vieweg Verlag Also available as IBM Research Report RZ 3335 (#93381)
-
B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The PERSEUS system architecture. In D. Fox, M. Köhntopp, and A. Pfitzmann, editors, VIS 2001, Sicherheight in komplexen IT-Infrastrukturen, DuD Fachbeitrge, pages 1-18. Vieweg Verlag, 2001. Also available as IBM Research Report RZ 3335 (#93381).
-
(2001)
VIS 2001, Sicherheight in Komplexen IT-Infrastrukturen
, pp. 1-18
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
20
-
-
0026297599
-
Towards trusted cut and paste in the X window system
-
San Antonio, TX, USA, Dec. A discussion of the security problems associated with cut and paste in multi-level secure versions of X
-
J. Picciotto. Towards trusted cut and paste in the X Window System. In Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1991. A discussion of the security problems associated with cut and paste in multi-level secure versions of X.
-
(1991)
Proceedings of the Seventh Annual Computer Security Applications Conference
-
-
Picciotto, J.1
-
21
-
-
54049104898
-
A comparison of trusted X security policies, architectures, and interoperability
-
San Antonio, TX, USA, Dec. A survey of interoperability issues among CMWs and the TRW prototype
-
J. Picciotto and J. Epstein. A comparison of Trusted X security policies, architectures, and interoperability. In Proceedings of the Eighth Annual Computer Security Applications Conference, San Antonio, TX, USA, Dec. 1992. A survey of interoperability issues among CMWs and the TRW prototype.
-
(1992)
Proceedings of the Eighth Annual Computer Security Applications Conference
-
-
Picciotto, J.1
Epstein, J.2
-
22
-
-
0021513250
-
The blit: A multiplexed graphics terminal
-
Oct.
-
R. Pike. The blit: A multiplexed graphics terminal. Bell Labs Tech. J., 63(8, part 2):1607-1631, Oct. 1984.
-
(1984)
Bell Labs Tech. J.
, vol.63
, Issue.8
, pp. 1607-1631
-
-
Pike, R.1
-
25
-
-
0007968045
-
Virtual network computing
-
T. Richardson, Q. Stafford-Fraser, K. R. Wood, and A. Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33-38, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
26
-
-
85077747733
-
Inter-client communications conventions manual, version 2.0
-
D. Rosenthal. Inter-client Communications Conventions Manual, version 2.0. X Consortium and Sun Microsystems, 1994.
-
(1994)
X Consortium and Sun Microsystems
-
-
Rosenthal, D.1
-
29
-
-
0001421170
-
EROS: A fast capability system
-
Kiawah Island Resort, near Charleston, SC, USA, Dec. ACM
-
J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: A fast capability system. In Proc. 17th ACM Symposium on Operating Systems Principles, pages 170-185, Kiawah Island Resort, near Charleston, SC, USA, Dec. 1999. ACM.
-
(1999)
Proc. 17th ACM Symposium on Operating Systems Principles
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
30
-
-
0033704964
-
Verifying the EROS confinement mechanism
-
Oakland, CA, USA
-
J. S. Shapiro and S. Weber. Verifying the EROS confinement mechanism. In Proc. 2000 IEEE Symposium on Security and Privacy, pages 166-176, Oakland, CA, USA, 2000.
-
(2000)
Proc. 2000 IEEE Symposium on Security and Privacy
, pp. 166-176
-
-
Shapiro, J.S.1
Weber, S.2
-
31
-
-
85077744918
-
Alto: A personal computer
-
Feb.
-
C. Thacker, E. M. McCreight, B. W. Lampson, R. F. Sproull, and D. Boggs. Alto: A personal computer. ACM Transactions on Computer Systems, 2(1), Feb. 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.1
-
-
Thacker, C.1
McCreight, E.M.2
Lampson, B.W.3
Sproull, R.F.4
Boggs, D.5
-
33
-
-
33751037227
-
Security requirements for system high and compartmented mode workstations
-
The MITRE Corporation, Bedford, MA, USA, Nov. The original requirements for the CMW, including a description of what they expect for Trusted X
-
J. P. L. Woodward. Security requirements for system high and compartmented mode workstations. Technical Report MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87), The MITRE Corporation, Bedford, MA, USA, Nov. 1987. The original requirements for the CMW, including a description of what they expect for Trusted X.
-
(1987)
Technical Report MTR 9992, Revision 1 (also Published by the Defense Intelligence Agency as Document DDS-2600-5502-87)
-
-
Woodward, J.P.L.1
|