Security architecture for component-based operating systems

[1]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[2]  Trent Jaeger,et al.  Operating System Protection for Fine-Grained Programs , 1998, USENIX Security Symposium.

[3]  Trent Jaeger,et al.  A role-based access control model for protection domain derivation and management , 1997, RBAC '97.

[4]  Pietro Iglio,et al.  Role templates for content-based access control , 1997, RBAC '97.

[5]  Emil C. Lupu,et al.  Reconciling role based management and role based access control , 1997, RBAC '97.

[6]  Jay Lepreau,et al.  The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.

[7]  Dan S. Wallach,et al.  Extensible security architectures for Java , 1997, SOSP.

[8]  David Mazières,et al.  Secure applications need flexible operating systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[9]  Li Gong,et al.  Java security: present and near future , 1997, IEEE Micro.

[10]  Gernot Heiser,et al.  Protection domain extensions in Mungi , 1996, Proceedings of the Fifth International Workshop on Object-Orientation in Operation Systems.

[11]  Matt Bishop,et al.  Checking for Race Conditions in File Accesses , 1996, Comput. Syst..

[12]  Spencer E. Minear,et al.  Providing Policy Control Over Object Operations in a Mach-Based System , 1995, USENIX Security Symposium.

[13]  Daniel F. Sterne,et al.  Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[14]  Michael N. Nelson,et al.  An overview of the Spring system , 1994, Proceedings of COMPCON '94.

[15]  Jochen Liedtke,et al.  Improving IPC by kernel design , 1994, SOSP '93.

[16]  Chorus Systemes,et al.  Overview of the CHORUS? Distributed Operating Systems , 1991 .

[17]  Claude Kaiser,et al.  Overview of the CHORUS ® Distributed Operating Systems , 1991 .

[18]  David L. Black,et al.  Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures , 1987, IEEE Trans. Computers.

[19]  Paul A. Karger,et al.  Improving security and performance for capability systems , 1988 .

[20]  Maurice V. Wilkes,et al.  The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .

[21]  William A. Wulf,et al.  HYDRA , 1974, Commun. ACM.

[22]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[23]  Jack B. Dennis,et al.  Programming semantics for multiprogrammed computations , 1966, CACM.