Secure Applications Need Flexible Operating Systems (1997)

Cached

Download Links

by David Mazieres , M. Frans Kaashoek
Venue:In Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI
Citations:31 - 1 self

Active Bibliography

22 Flexible Control of Downloaded Executable Content – Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam - 1997
3 User Authentication and Remote Execution Across Administrative Domains – M. Frans Kaashoek, Arthur C. Smith, Michael Kaminsky, Michael Kaminsky - 2004
4 REX: Secure, Extensible Remote Execution – Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek - 2004
1 Flexible Key Management with SFS Agents – M. Frans Kaashoek, Michael Kaminsky, Michael Kaminsky - 2000
25 Self-certifying File System – David Mazieres - 2000
28 Decentralized user authentication in a global file system – Michael Kaminsky, George Savvides, M. Frans Kaashoek - 2003
201 Separating key management from file system security – David Mazieres, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel - 1999
3 Secure Internet Smartcards – Naomaru Itoi, Naomaru Itoi, Tomoko Fukuzawa, Tomoko Fukuzawa, Peter Honeyman, Peter Honeyman - 2000
55 Mostly-Static Decentralized Information Flow Control – Andrew C. Myers - 1999
43 Secure Network Objects – Leendert Van Doorn, Martín Abadi, Mike Burrows, Edward Wobber - 1996
5 Snare: A strong security scheme for network-attached storage – Yingwu Zhu - 2003
25 Security Protocols and Specifications – Martín Abadi - 1999
40 Security Protocols and their Properties – Martín Abadi - 2000
1 Improving the Security and Flexibility of Onetime Passwords by Signature Chains – Kemal Biçakci, Nazife Baykal - 2003
15 A Session-Based Architecture for Internet Mobility – Mark Alexander Connell Snoeren - 2003
3 SSU:Extending ssh for Secure Root Administration – Christopher Thorpe, Christopher Thorpe Yahoo
9 Access and integrity control in a public-access, high-assurance configuration management system – Jonathan S. Shapiro, John Vanderburgh - 2002
8 Security architecture for component-based operating systems – Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park - 1998
1 Disconnected Operation in the Pesto Storage System – Feike W. Dillema - 2005