Untrusted hosts and confidentiality
- 21 October 2001
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 22 references indexed in Scilit:
- Protecting privacy using the decentralized label modelACM Transactions on Software Engineering and Methodology, 2000
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- From system F to typed assembly languageACM Transactions on Programming Languages and Systems, 1999
- Multilevel security in the UNIX traditionSoftware: Practice and Experience, 1992
- Fine-grained mobility in the Emerald systemACM Transactions on Computer Systems, 1988
- A Randomized Protocol for Signing ContractsPublished by Springer Nature ,1983
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- Security Kernel validation in practiceCommunications of the ACM, 1976
- Memoryless subsystemsThe Computer Journal, 1974