Check out the new USENIX Web site. next up previous
Next: About this document Up: Operating System Protection for Previous: Acknowledgements

References

1
R. Anand, N. Islam, T. Jaeger, and J. R. Rao. A flexible security model for using Internet content. IEEE Software, 1997.

2
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, James P. Anderson and Co., Fort Washington, PA, USA, 1972.

3
A. Berman, V. Bourassa, and E. Selberg. TRON: Process-specific file protection for the UNIX operating system. In Proceedings of the 1995 USENIX Winter Technical Conference, pages 165-175, 1995.

4
N. S. Borenstein. Email with a mind of its own: The Safe-Tcl language for enabled mail. In ULPAA '94, pages 389-402, 1994.

5
A. Dan, A. Mohindra, R. Ramaswami, and D. Sitaram. ChakraVyuha: A sandbox operating system for the controlled execution of alien code. Technical Report 20742, IBM T. J. Watson Research Center, 1997.

6
C. Friberg and A. Held. Support for discretionary role-based access control in acl-oriented operating systems. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997.

7
F. S. Gallo. Penguin: Java done right. The Perl Journal, 1(2):10-12, 1996.

8
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium, pages 1-14, July 1996.

9
L. Gong. A secure identity-based capability system. In IEEE Symposium on Security and Privacy, pages 56-63, 1989.

10
L. Gong. New security architectural directions for Java. In IEEE COMPCON '97, February 1997.

11
R. Grimm and B. Bershad. Security for extensible systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems, pages 62-66, May 1997.

12
T. Jaeger, F. Giraud, N. Islam, and J. Liedtke. A role-based access control model for protection domain derivation and management. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997.

13
T. Jaeger, N. Islam, R. Anand, A. Prakash, and J. Liedtke. Flexible control of downloaded executable content. Technical Report RC 20886, IBM T. J. Watson Research Center, 1997.

14
T. Jaeger and A. Prakash. Support for the file system security requirements of computational e-mail systems. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 1-9, 1994.

15
T. Jaeger, A. Rubin, and A. Prakash. Building systems that flexibly control downloaded executable content. In Proceedings of the 6th USENIX Security Symposium, pages 131-148, July 1996.

16
P. A. Karger. Improving Security and Performance for Capability Systems. PhD thesis, University of Cambridge, 1988.

17
B. Lampson. Protection. ACM Operating Systems Review, 8(1):18-24, January 1974.

18
J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th Symposium on Operating Systems Principles, pages 175-187, 1993.

19
D. Mazieres and M. F. Kaashoek. Secure applications need flexible operating systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems, pages 56-61, May 1997.

20
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proofs. Technical Report CSL-116, SRI International, 1990.

21
J. Ousterhout, J. Levy, and B. Welch. The Safe-Tcl security model, 1997. Available at https://www.sunlabs.com/ ouster/safeTcl.html.

22
D. D. Redell. Naming and Protection in Extensible Operating Systems. PhD thesis, University of California, Berkeley, 1974. Published as Project MAC TR-140, Massachusetts Institute of Technology.

23
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.

24
G. van Rossum. Grail - The browser for the rest of us (draft), 1996. Available at https://monty.cnri.reston.va.us/grail/.

25
D. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for java. Technical Report 546-97, Princeton University, 1997.

26
D. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for java. In Proceedings of the 16th Symposium on Operating Systems Principles, 1997.

27
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, February 1994.

28
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17(6):337-345, June 1974.



Trent Jaeger
Tue Dec 9 10:40:18 EST 1997