Access Control Based on Execution History
暂无分享,去创建一个
[1] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[2] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[3] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[4] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[5] Daniel Le Métayer,et al. Verification of control flow based security properties , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Mark Russinovich,et al. Inside Microsoft Windows 2000 , 2000 .
[7] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[8] Andrew W. Appel,et al. SAFKASI: a security mechanism for language-based systems , 2000, TSEM.
[9] Cédric Fournet,et al. Stack inspection: Theory and variants , 2003, TOPL.
[10] Vipin Chaudhary,et al. History-based access control for mobile code , 1998, CCS '98.
[11] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[12] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[13] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[14] H SaltzerJerome. Protection and the control of information sharing in multics , 1973 .
[15] HardyNorm. The Confused Deputy , 1988 .
[16] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .