A Feather-Weight Application Isolation Model
暂无分享,去创建一个
[1] B. D. GOLD,et al. A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Renato J. O. Figueiredo,et al. A case for grid computing on virtual machines , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[3] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Lance J. Hoffman,et al. Smoking out the bad actors: Risk analysis in the age of the microcomputer , 1989, Comput. Secur..
[5] Peter J. Denning,et al. On the Derivation of Lattice Structured Information Flow Policies , 1976 .
[6] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[7] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[8] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[9] Ashvin Goel,et al. Application-level isolation and recovery with solitude , 2008, Eurosys '08.
[10] Colin O'Halloran,et al. A Calculus of Information Flow , 1990, ESORICS.
[11] Peter J. Denning,et al. Fault Tolerant Operating Systems , 1976, CSUR.
[12] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[13] Fred Cohen,et al. Computational aspects of computer viruses , 1989, Comput. Secur..
[14] James A. Whittaker. Why Secure Applications are Difficult to Write , 2003, IEEE Secur. Priv..
[15] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[16] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[17] Mary Campione,et al. The Java Tutorial Continued: The Rest of the JDK , 1998 .