Untrusted hosts and confidentiality
- 21 October 2001
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 35 (5) , 1-14
- https://doi.org/10.1145/502059.502036
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Protecting privacy using the decentralized label modelACM Transactions on Software Engineering and Methodology, 2000
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- From system F to typed assembly languageACM Transactions on Programming Languages and Systems, 1999
- Multilevel security in the UNIX traditionSoftware: Practice and Experience, 1992
- Fine-grained mobility in the Emerald systemACM Transactions on Computer Systems, 1988
- A Randomized Protocol for Signing ContractsPublished by Springer Nature ,1983
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- Security Kernel validation in practiceCommunications of the ACM, 1976
- Memoryless subsystemsThe Computer Journal, 1974