Some thoughts on security after ten years of qmail 1.0
暂无分享,去创建一个
[1] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[2] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[3] Karen R. Sollins,et al. Expanding and Extending the Security Features of Java , 1998, USENIX Security Symposium.
[4] Daniel F. Sterne,et al. Confining Root Programs with Domain and Type Enforcement , 1996, USENIX Security Symposium.
[5] Alain J. Mayer,et al. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies , 1998, USENIX Security Symposium.
[6] Anurag Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications , 2000, USENIX Security Symposium.
[7] Donald E. Knuth,et al. Structured Programming with go to Statements , 1974, CSUR.
[8] Kyle Wheeler. Qmail Quickstarter: Install, Set Up and Run Your Own Email Server , 2007 .
[9] Matt Bishop,et al. A Flexible Containment Mechanism for Executing Untrusted Code , 2002, USENIX Security Symposium.
[10] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[11] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[12] Richard Blum. Running qmail , 2000 .
[13] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[14] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .