A secure environment for untrusted helper applications: Confining the wily hacker (1996)

by I GOLDBERG, D WAGNER, R THOMAS, E A BREWER
Venue:In Proceedings of the 6th Conference on USENIX Security Symposium