Extending a capability based system into a network environment
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Protection in programming languages
Communications of the ACM
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Verifying the EROS Confinement Mechanism
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
PROGRAMMING SEMANTICS FOR MULTIPROGRAMMED COMPUTATIONS
PROGRAMMING SEMANTICS FOR MULTIPROGRAMMED COMPUTATIONS
Polaris: virus-safe computing for Windows XP
Communications of the ACM - Privacy and security in highly dynamic systems
Robust composition: towards a unified approach to access control and concurrency control
Robust composition: towards a unified approach to access control and concurrency control
Object views: fine-grained sharing in browsers
Proceedings of the 19th international conference on World wide web
Hi-index | 0.00 |
Programs do good things, but also do bad, making software security more than a fad. The authority of programs, we do need to tame. But bad things still happen. Who do we blame? From the very beginnings of access control: Should we be safe by construction, or should we patrol? Horton shows how, in an elegant way, we can simply do both, and so save the day.