On Access Checking in Capability-Based Systems
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Commentary on standard ML
The interaction of architecture and operating system design
ASPLOS IV Proceedings of the fourth international conference on Architectural support for programming languages and operating systems
Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Extensibility safety and performance in the SPIN operating system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
DCE security programming
Dealing with disaster: surviving misbehaved kernel extensions
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
COBRA fundamentals and programming
COBRA fundamentals and programming
Java security: hostile applets, holes&antidotes
Java security: hostile applets, holes&antidotes
JavaScript (2nd ed.): the definitive guide
JavaScript (2nd ed.): the definitive guide
Shockwave studio: designing multimedia for the web
Shockwave studio: designing multimedia for the web
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Capability-Based Computer Systems
Capability-Based Computer Systems
Java Virtual Machine Specification
Java Virtual Machine Specification
The Java Language Specification
The Java Language Specification
Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications
The Gateway Security Model in the Java Electronic Commerce Framework
FC '97 Proceedings of the First International Conference on Financial Cryptography
ACM SIGOPS Operating Systems Review
New security architectural directions for Java
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
A language extension for controlling access to shared data
ICSE '76 Proceedings of the 2nd international conference on Software engineering
ACM SIGOPS Operating Systems Review
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Security Kernel Based on the Lambda-Calculus
A Security Kernel Based on the Lambda-Calculus
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Security properties of typed applets
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Role-based access control in Java
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
JRes: a resource accounting interface for Java
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Meta objects for access control: a formal model for role-based principals
Proceedings of the 1998 workshop on New security paradigms
MOCA: a service framework for mobile computing devices
Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access
EROS: a fast capability system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Role-based access control on the Web using Java
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Distributed virtual machines: a system architecture for network computing
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Nested Java processes: OS structure for mobile code
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Security architecture for component-based operating systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Application isolation in the Java Virtual Machine
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
SAFKASI: a security mechanism for language-based systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
J-Kernel: a capability-based operating system for Java
Secure Internet programming
History-based access control for mobile code
Secure Internet programming
Termination in language-based systems
ACM Transactions on Information and System Security (TISSEC)
Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl
ACM SIGOPS Operating Systems Review
Agent factory: generative migration of mobile agents in heterogeneous environments
Proceedings of the 2002 ACM symposium on Applied computing
Incommunicado: efficient communication for isolates
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Access rights analysis for Java
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
A survey of customizability in operating systems research
ACM Computing Surveys (CSUR)
IEEE Internet Computing
Securing Systems Against External Programs
IEEE Internet Computing
Computer
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Sharing in Typed Module Assembly Language
TIC '00 Selected papers from the Third International Workshop on Types in Compilation
Towards Secure Downloadable Executable Content: The Java Paradigm
SAFECOMP '98 Proceedings of the 17th International Conference on Computer Safety, Reliability and Security
Anomaly intrusion detection in dynamic execution environments
Proceedings of the 2002 workshop on New security paradigms
Scale and performance in the Denali isolation kernel
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Luna: a flexible Java protection system
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Secure composition of untrusted code: box π, wrappers, and causality types
Journal of Computer Security - CSFW13
DISE: a programmable macro engine for customizing applications
Proceedings of the 30th annual international symposium on Computer architecture
Journal of Computer Security - IFIP 2000
Channel dependent types for higher-order mobile processes
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A tail-recursive machine with stack inspection
ACM Transactions on Programming Languages and Systems (TOPLAS)
Scale and performance in the Denali isolation kernel
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Formalising Java RMI with explicit code mobility
OOPSLA '05 Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Journal of Functional Programming
Sub-operating systems: a new approach to application security
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Formal specification and analysis of JAAS framework
Proceedings of the 2006 international workshop on Software engineering for secure systems
MAPbox: using parameterized behavior classes to confine untrusted applications
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Preventing privilege escalation
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Active names: flexible location and transport of wide-area resources
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Expanding and extending the security features of java
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Techniques for the design of java operating systems
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Implementing multiple protection domains in java
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Formalising Java RMI with explicit code mobility
Theoretical Computer Science
HERMES: A Software Architecture for Visibility and Control in Wireless Sensor Network Deployments
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Trust on the world wide web: a survey
Foundations and Trends in Web Science
On the use of metatypes for safe embedded operating system extension
International Journal of Parallel, Emergent and Distributed Systems
Understanding security architecture
Proceedings of the 2008 Spring simulation multiconference
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Non-delegatable authorities in capability systems
Journal of Computer Security
The case for intentional networking
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Active cache: caching dynamic contents on the Web
Middleware '98 Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Isolating untrusted software extensions by custom scoping rules
Computer Languages, Systems and Structures
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A tail-recursive semantics for stack inspections
ESOP'03 Proceedings of the 12th European conference on Programming
A sandbox with a dynamic policy based on execution contexts of applications
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Enhancing Java security with history based access control
Foundations of security analysis and design IV
Intentional networking: opportunistic exploitation of mobile network diversity
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Securing script-based extensibility in web browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Interprocedural analysis for privileged code placement and tainted variable detection
ECOOP'05 Proceedings of the 19th European conference on Object-Oriented Programming
A generic XACML based declarative authorization scheme for java
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Discretionary capability confinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hi-index | 0.00 |