The Safe-Tcl Security Model
暂无分享,去创建一个
John K. Ousterhout | Brent B. Welch | Laurent Demailly | Jacob Y. Levy | J. Ousterhout | B. Welch | Laurent Demailly | J. Levy | L. Demailly
[1] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[2] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[3] John K. Ousterhout,et al. Tcl and the Tk Toolkit , 1994 .
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Butler W. Lampson,et al. Authentication in distributed systems , 1993 .
[6] Ken Arnold,et al. The Java Programming Language , 1996 .
[7] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[8] David Alan Hanson,et al. Data security , 1979, ACM-SE 17.
[9] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[10] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[11] Peter Pipe,et al. Practical Programming , 1966 .
[12] Brent B Welch,et al. Practical Programming in Tcl and Tk , 1999 .
[13] Frank Yellin,et al. Low Level Security in Java , 1995, WWW.
[14] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.