Security architecture for component-based operating systems
暂无分享,去创建一个
Trent Jaeger | Jochen Liedtke | Nayeem Islam | Vsevolod Panteleenko | Yoonho Park | Trent Jaeger | J. Liedtke | N. Islam | Yoonho Park | Vsevolod Panteleenko | T. Jaeger
[1] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[2] Trent Jaeger,et al. Operating System Protection for Fine-Grained Programs , 1998, USENIX Security Symposium.
[3] Trent Jaeger,et al. A role-based access control model for protection domain derivation and management , 1997, RBAC '97.
[4] Pietro Iglio,et al. Role templates for content-based access control , 1997, RBAC '97.
[5] Emil C. Lupu,et al. Reconciling role based management and role based access control , 1997, RBAC '97.
[6] Jay Lepreau,et al. The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.
[7] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[8] David Mazières,et al. Secure applications need flexible operating systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[9] Li Gong,et al. Java security: present and near future , 1997, IEEE Micro.
[10] Gernot Heiser,et al. Protection domain extensions in Mungi , 1996, Proceedings of the Fifth International Workshop on Object-Orientation in Operation Systems.
[11] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[12] Spencer E. Minear,et al. Providing Policy Control Over Object Operations in a Mach-Based System , 1995, USENIX Security Symposium.
[13] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[14] Michael N. Nelson,et al. An overview of the Spring system , 1994, Proceedings of COMPCON '94.
[15] Jochen Liedtke,et al. Improving IPC by kernel design , 1994, SOSP '93.
[16] Chorus Systemes,et al. Overview of the CHORUS? Distributed Operating Systems , 1991 .
[17] Claude Kaiser,et al. Overview of the CHORUS ® Distributed Operating Systems , 1991 .
[18] David L. Black,et al. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures , 1987, IEEE Trans. Computers.
[19] Paul A. Karger,et al. Improving security and performance for capability systems , 1988 .
[20] Maurice V. Wilkes,et al. The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .
[21] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[22] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[23] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.