A Flexible Security System for Using Internet Content
暂无分享,去创建一个
[1] Andrew Berman,et al. TRON: Process-Specific File Protection for the UNIX Operating System , 1995, USENIX.
[2] John K. Ousterhout,et al. Tcl and the Tk Toolkit , 1994 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Nathaniel S. Borenstein,et al. Computational mail as network infrastructure for computer-supported cooperative work , 1992, CSCW '92.
[5] Atul Prakash,et al. Implementation of a discretionary access control model for script-based systems , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[6] David M. Balenson,et al. Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers , 1993, RFC.
[7] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Atul Prakash,et al. Support for the file system security requirements of computational E-mail systems , 1994, CCS '94.
[9] John K. Ousterhout,et al. Safe Tcl: a toolbox for constructing electronic meeting places , 1995 .
[10] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[11] Li Gong,et al. New security architectural directions for Java , 1997, COMPCON.
[12] Michael J. Carey,et al. The design of the E programming language , 1993, TOPL.
[13] Atul Prakash,et al. Flexible control of downloaded executable content , 1999, TSEC.
[14] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[15] Aviel D. Rubin. Trusted distribution of software over the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[16] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[17] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[18] Atul Prakash,et al. Building systems that flexibly control downloaded executable context , 1996 .