An operating system approach to securing e-services
Communications of the ACM
Security Control for COTS Components
Computer
Providing Secure Environments for Untrusted Network Applications
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Vaulted VPN: compartmented virtual private networks on trusted operating systems
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Hi-index | 0.02 |