Protecting users from "themselves"
暂无分享,去创建一个
Trent Jaeger | Sandra Julieta Rueda | Joshua Schiffman | Yogesh Sreenivasan | Patrick D. McDaniel | William Enck | Luke St. Clair | P. Mcdaniel | Joshua Schiffman | S. Rueda | Luke St. Clair | Yogesh Sreenivasan | W. Enck | T. Jaeger
[1] Christian Friberg,et al. Support for discretionary role based access control in ACL-oriented operating systems , 1997, RBAC '97.
[2] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[3] Atul Prakash,et al. Methods and limitations of security policy reconciliation , 2006, TSEC.
[4] Calton Pu,et al. SubDomain: Parsimonious Server Security , 2000, LISA.
[5] Protecting User Files by Reducing Application Access , 2007 .
[6] Andrew Berman,et al. TRON: Process-Specific File Protection for the UNIX Operating System , 1995, USENIX.
[7] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[8] Michael D. Schroeder,et al. FINAL REPORT OF THE MULTICS KERNEL DESIGN PROJECT , 1978 .
[9] Andrew S. Tanenbaum,et al. Distributed systems: Principles and Paradigms , 2001 .
[10] Alan H. Karp,et al. Polaris: virus-safe computing for Windows XP , 2006, CACM.
[11] Atul Prakash,et al. Methods and limitations of security policy reconciliation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Jasna Kuljis,et al. Aligning usability and security: a usability study of Polaris , 2006, SOUPS '06.
[13] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[14] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[15] K. Thompson,et al. The UNIX time-sharing system , 1978 .