A lattice model of secure information flow
Communications of the ACM
A note on the confinement problem
Communications of the ACM
VM/370 security retrofit program
ACM '77 Proceedings of the 1977 annual conference
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
IEEE Transactions on Software Engineering
Inferential security in individual computing environments
ACM SIGICE Bulletin
Shared resource matrix methodology: an approach to identifying storage and timing channels
ACM Transactions on Computer Systems (TOCS)
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Resolving covert channels within a B2 class secure system
ACM SIGOPS Operating Systems Review
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Opportunistic Scheduling Of Secure Tasks In A Multiprocessor Environment
Journal of Integrated Design & Process Science
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
A security domain model to assess software for exploitable covert channels
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
ACM Transactions on Information and System Security (TISSEC)
An analysis of the timed Z-channel
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |