-
1
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, April
-
D. D. Clark, D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Security and Privacy, Oakland, CA, April 1987, pp. 184-194.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
2
-
-
0029697575
-
Java security: From HotJava to netscape and beyond
-
Oakland, CA, May
-
D. Dean, E. W. Felten, D. S. Wallach, Java Security: From HotJava to Netscape and Beyond, IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 190-200.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
-
3
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
San Jose, CA, July
-
I. Goldberg, et al, A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker, USENIX Security Symposium, San Jose, CA, July 1996, pp 1-13.
-
(1996)
USENIX Security Symposium
, pp. 1-13
-
-
Goldberg, I.1
-
4
-
-
0003313661
-
Java security: Present and near future
-
May/June
-
L. Gong, Java Security: Present and Near Future, IEEE Micro paper, 17(3), May/June 1997, pp. 14-19.
-
(1997)
IEEE Micro Paper
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
7
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May
-
S. Jajodia, A Logical Language for Expressing Authorizations, IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 31-42.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
-
8
-
-
77950588719
-
-
May
-
JavaSoft, Sun Microsystems, HotJava(tm): The Security Story, May 1995, http://www.javasoft.com:/sfaq/may95/security.html.
-
(1995)
HotJava(tm): The Security Story
-
-
-
10
-
-
3943088348
-
A security model for aglets
-
July/August
-
G. Karjoth et al, A Security Model for Aglets, IEEE Internet Computing, 1(4) July/August 1997.
-
(1997)
IEEE Internet Computing
, vol.1
, Issue.4
-
-
Karjoth, G.1
-
11
-
-
0015672289
-
A note on the confinement problem
-
October
-
B. Lampson, A Note on the Confinement Problem, Communications of the ACM, 16(10), October 1973, pp. 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
12
-
-
0029488806
-
MCF: A Malicious code filter
-
R. Lo, K. Levitt, R. Olsson, MCF: A Malicious Code Filter, Computers & Security 14 (6), 1995, pp. 541-566.
-
(1995)
Computers & Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.1
Levitt, K.2
Olsson, R.3
-
13
-
-
85077772295
-
Fine-grained control of Java applets using a simple constraint language
-
June Also thesis for Master's of Engineering, MIT. June 1997
-
N. V. Mehta, Fine-Grained Control of Java Applets Using a Simple Constraint Language, MIT/LCS/TR-713, June 1997. Also thesis for Master's of Engineering, MIT. June 1997.
-
(1997)
MIT/LCS/TR-713
-
-
Mehta, N.V.1
-
15
-
-
0028566761
-
-
Gaithersburg, MD, June IEEE Press
-
I. S. Moskowitz and M. H. Kang, Covert Channels - Here to Stay?, COMPASS'94, Gaithersburg, MD, June 1994, IEEE Press, pp. 235-243.
-
(1994)
Covert Channels - Here to Stay?, COMPASS'94
, pp. 235-243
-
-
Moskowitz, I.S.1
Kang, M.H.2
-
19
-
-
0024125647
-
Transaction control expressions for separation of duties
-
December
-
R. Sandhu, Transaction Control Expressions for Separation of Duties, 4th Aerospace Computer Security Conference, December 1988, pp. 282-286.
-
(1988)
4th Aerospace Computer Security Conference
, pp. 282-286
-
-
Sandhu, R.1
-
20
-
-
0030644642
-
Separation of duty in role-based environments
-
Rockport, MA, June
-
R. T. Simon, M. E. Zurko, Separation of Duty in Role-Based Environments, Computer Security Foundations Workshop, Rockport, MA, June 1997.
-
(1997)
Computer Security Foundations Workshop
-
-
Simon, R.T.1
Zurko, M.E.2
-
22
-
-
0029697576
-
Secure network objects
-
Oakland, CA, May
-
L. van Doorn, et al, Secure Network Objects, IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 211-221.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Van Doorn, L.1
-
23
-
-
0003224492
-
Extensible security architectures for Java
-
St. Malo, France, October
-
D. S. Wallach et al, Extensible Security Architectures for Java, Symposium on Operating Systems Principles, St. Malo, France, October 1997.
-
(1997)
Symposium on Operating Systems Principles
-
-
Wallach, D.S.1
|