- {1} J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, James P. Anderson and Co., Fort Washington, PA, USA, 1972.Google ScholarCross Ref
- {2} L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In IEEE Symposium on Security and Privacy, pages 66-77, 1995. Google ScholarDigital Library
- {3} M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2): 131-152, 1996.Google Scholar
- {4} J. B. Dennis and E. C. Van Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3):143-155, March 1966. Google ScholarDigital Library
- {5} B. Ford, G. Back, G. Benson, J. Lepreau, A. Lin, and O. Shivers. The Flux OSKit: A substrate for kernel and language research. In Proceedings of the 16th Symposium on Operating Systems Principles, 1997. Google ScholarDigital Library
- {6} F. S. Gallo. Penguin: Java done right. The Perl Journal, 1(2):10- 12, 1996.Google Scholar
- {7} L. Giuri and P. Iglio. Role templates for content-based access control. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarDigital Library
- {8} L. Gong. Java security: present and near future. IEEE Micro, 17(3):14-19, 1997. Google ScholarDigital Library
- {9} T. Jaeger, F. Giraud, N. Islam, and J. Liedtke. A role-based access control model for protection domain derivation and management. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarDigital Library
- {10} T. Jaeger, J. Liedtke, and N. Islam. Operating system protection for fine-grained programs. In Proceedings of the 7th USENIX Security Symposium, pages 143-156, January 1998. Google ScholarDigital Library
- {11} P. A. Karger. Improving Security and Performance for Capability Systems. PhD thesis, University of Cambridge, 1988.Google Scholar
- {12} J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th Symposium on Operating Systems Principles, pages 175-187, 1993. Google ScholarDigital Library
- {13} E. C. Lupu and M. Sloman. Reconciling role-based management and role-based access control. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarDigital Library
- {14} D. Mazieres and M. F. Kaashoek. Secure applications need flexible operating systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems, pages 56-61, May 1997. Google ScholarDigital Library
- {15} S. E. Minear. Providing policy control over object operations in a Mach-based system. In Proceedings of the 5th USENIX UNIX Security Symposium, 1995. Google ScholarDigital Library
- {16} J. G. Mitchell and et al. An overview of the Spring system. In Proceedings of Compcon, February 1994.Google Scholar
- {17} J. K. Ousterhout, J. Y. Levy, and B. B. Welch. The Safe-Tcl security model. In Proceedings of the 23rd USENIX Annual Technical Conference, 1998. Google ScholarDigital Library
- {18} R. Rashid, A. Tevanian Jr., M. Young, D. Golub, D. Baron, D. Black, W. J. Bolosky, and J. Chew. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures. IEEE Transactions on Computers, 37(8):896-908, August 1988. Google ScholarDigital Library
- {19} M. Rozier and et al. Overview of the Chorus distributed operating system. In USENIX Symposium on Micro-kernels and Other Kernel Architectures, pages 39-69, 1992. Google ScholarDigital Library
- {20} G. van Rossum. Grail - The browser for the rest of us (draft), 1996. Available at http://monty.cnri.reston.va.us/grail/.Google Scholar
- {21} J. Vochteloo, K. Elphinstone, S. Russell and G. Heiser. Protection domain extensions in Mungi. In Proceedings of the Fifth International Workshop on Object Orientation in Operating Systems, pages 161-165, October 1996. Google ScholarDigital Library
- {22} D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the 16th Symposium on Operating Systems Principles, 1997. Google ScholarDigital Library
- {23} M. V. Wilkes and R. M. Needham. The Cambridge CAP Computer and Its Operating System. North Holland, 1979. Google ScholarDigital Library
- {24} W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17(6):337-345, June 1974. Google ScholarDigital Library
Index Terms
- Security architecture for component-based operating systems
Recommendations
Assessing Security to Compare Architecture Alternatives of Component-Based Systems
QRS '15: Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and SecurityModern software development is typically performed by composing a software system from building blocks. The component-based paradigm has many advantages. However, security quality attributes of the overall architecture often remain unspecified and ...
Operating Systems for Component Software Environments
HOTOS '97: Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems (OSs) are designed to host and manage component software effectively. Components impact OS ...
Comments