Research on the Application Security Isolation Model
暂无分享,去创建一个
[1] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[2] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[3] Mary Campione,et al. The Java Tutorial Continued: The Rest of the JDK , 1998 .
[4] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[5] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[6] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[7] Yang Yu,et al. A feather-weight virtual machine for windows applications , 2006, VEE '06.
[8] Ashvin Goel,et al. Application-level isolation and recovery with solitude , 2008, Eurosys '08.
[9] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.