Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Introduction to OSF DCE (rev. 1.0)
Introduction to OSF DCE (rev. 1.0)
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Support for the file system security requirements of computational E-mail systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
DistView: support for building efficient collaborative applications using replicated objects
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
Discretionary access control by means of usage conditions
Computers and Security
Design for dynamic user-role-based security
Computers and Security
Corona: a communication service for scalable, reliable group collaboration systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications
Specifying security for CSCW systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Implementation of a discretionary access control model for script-based systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Trusted distribution of software over the Internet
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Safe Tcl: a toolbox for constructing electronic meeting places
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Supporting multi-user, multi-applet workspaces in CBE
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
Support for discretionary role based access control in ACL-oriented operating systems
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
A view-based access control model for CORBA
Secure Internet programming
Access control in configurable systems
Secure Internet programming
History-based access control for mobile code
Secure Internet programming
A Flexible Security System for Using Internet Content
IEEE Software
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
SECURITY OF DOWNLOADABLE EXECUTABLE CONTENT
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A system architecture for flexible control of downloaded executable content
IWOOOS '96 Proceedings of the 5th International Workshop on Object Orientation in Operating Systems (IWOOOS '96)
Sub-operating systems: a new approach to application security
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
MAPbox: using parameterized behavior classes to confine untrusted applications
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Security of web browser scripting languages: vulnerabilities, attacks, and remedies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Resource access control for an internet user agent
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
Identifying native applications with high assurance
Proceedings of the second ACM conference on Data and Application Security and Privacy
Hi-index | 0.00 |
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are ...