The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Building Systems to Be Shared, Securely
Queue - Virtual Machines
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A critique of the GNU hurd multi-server operating system
ACM SIGOPS Operating Systems Review
Bitfrost: the one laptop per child security model
Proceedings of the 3rd symposium on Usable privacy and security
Delegating responsibility in digital systems: Horton's "who done it?"
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Reusability of Functionality-Based Application Confinement Policy Abstractions
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Practical protection for personal storage in the cloud
Proceedings of the Third European Workshop on System Security
Proceedings of the Sixth Symposium on Usable Privacy and Security
A control point for reducing root abuse of file-system privileges
Proceedings of the 17th ACM conference on Computer and communications security
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Proceedings of the 17th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
International Journal of Information Security and Privacy
Hi-index | 0.00 |
It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.