-
1
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghihat. Practical domain and type enforcement for UNIX. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 66-77, 1995.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghihat, S.A.5
-
2
-
-
0003400251
-
-
Technical Report ESD-TR-73-278 ( I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April
-
D. E. Bell and L.J. LaPadula. Secure computer systems. Technical Report ESD-TR-73-278 (Vol I-III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974.
-
(1974)
Secure Computer Systems
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
85077731848
-
Unix security: Security in programming
-
Washington DC, May
-
M. Bishop. Unix security: Security in programming. SANS'96. Washington DC, May 1996. URL: http://seclab.cs.ucdavis.edu/bishop/secprog.html.
-
(1996)
SANS'96
-
-
Bishop, M.1
-
5
-
-
0023266943
-
A comparison of commercial and military security policies
-
Oakland, CA, April
-
David D. Clark and David R. Wilson. A comparison of commercial and military security policies. In 1987 IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.
-
(1987)
1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
11
-
-
85084162735
-
A secure environment for untrusted helper applications - Confining the wily hacker
-
San Jose, California, July
-
Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications - confining the wily hacker. In Proceedings of the Sixth USENIX Security Symposium,, San Jose, California, July 1996.
-
(1996)
Proceedings of the Sixth USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
13
-
-
0038329527
-
A model for transactional workflows
-
Dean Kuo, Michael Lawley, Chengfei Liu, and Maria Orlowska. A model for transactional workflows. Australian Computer Science Communications, 18(2):139-146, 1996.
-
(1996)
Australian Computer Science Communications
, vol.18
, Issue.2
, pp. 139-146
-
-
Kuo, D.1
Lawley, M.2
Liu, C.3
Orlowska, M.4
-
18
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
85077744173
-
-
sudo. URL: http://ftp.courtesan.com/pub/sudo.
-
-
-
-
20
-
-
85077758281
-
-
super. U R L: http: //ftp.ucolick.org/pub/users/will/ .
-
-
-
|