Previous Up Previous Contents References
References

References

[1]
R. Atkinson. RFC 1825 - Security Architecture for the Internet Protocol. IETF, August 1995.

[2]
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghigha. A domain and type enforcement UNIX prototype. In Proceedings of the fifth USENIX UNIX Security Symposium: June 5--7, 1995, Salt Lake City, Utah, USA, pages 127--140, Berkeley, CA, USA, June 1995. USENIX.

[3]
M. L. Bailey, B. Gopal, M. A. Pagels, L. L. Peterson, and P. Sarkar. PATHFINDER: A pattern-based packet classifier. In Proceedings of the First Symposium on Operating Systems Design and Implementation, pages 115--123, 1994.

[4]
B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, safety and performance in the spin operating system. In Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP-15), pages 267--284.

[5]
B. N. Bershad, T. E. Anderson, E. D. Lazowska, and H. M. Levy. Lightweight remote procedure calls. ACM Transactions on Computer Systems, TOCS, 8(1):37--55, Feb. 1990.

[6]
J. Chase, H. Levy, M. Baker-Harvey, and E. Lazowska. Opal: A single address space system for 64-bit architectures. In Proceedings of the Fourth Workshop on Workstation Operating Systems, pages 80--85, 1993.

[7]
T. Dierks and C. Allen. Internet Draft: The TLS Protocol Version 1.0. IETF, November 1997.

[8]
P. Druschel and L. L. Peterson. Fbufs: A high-bandwidth cross-domain transfer facility. In Proceedings of the 14th Symposium on Operating Systems Principles, pages 189--202, New York, NY, USA, Dec. 1993. ACM Press.

[9]
Y. Endo, J. Gwertzman, M. Seltzer, C. Small, K. A. Smith, and D. Tang. VINO: The 1994 fall harvest. Technical Report TR-34-94, Harvard University, Cambridge, MA, 1994.

[10]
B. Ford and J. Lepreau. Evolving mach 3.0 to a migrating thread model. In Proceedings of the Winter 1994 USENIX Technical Conference and Exhibition, pages 97--114, Jan. 1994.

[11]
G. Heiser, K. Elphinstone, S. Russell, and J. Vochteloo. Mungi: A distributed single address-space operating system. Technical Report SCS&E Report 9314, University of New South Wales, Australia, Nov. 1993.

[12]
D. Mosberger. Message library design notes. Technical Report TR97-19, The Department of Computer Science, University of Arizona, Tuesday, Nov. 25 1997.

[13]
D. Mosberger and L. L. Peterson. Making paths explicit in the scout operating system. In 2nd Symposium on Operating Systems Design and Implementation (OSDI '96), October 28--31, 1996. Seattle, WA, pages 153--167, Berkeley, CA, USA, Oct. 1996. USENIX.

[14]
S. J. Mullender, I. M. Leslie, and D. McAuley. Operating system support for distributed multimedia. In Proceedings of the Summer 1994 USENIX Conference: June 6--10, 1994, Boston, Massachusetts, USA, pages 209--219, Berkeley, CA, USA, Summer 1994. USENIX.

[15]
G. C. Necula. Proof-carrying code. In Conference Record of POPL '97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 106--119, Paris, France, 15--17 Jan. 1997.

[16]
P. G. Neumann. Architectures and formal representations for secure systems. Technical Report SRI-CSL-96-05, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1996.

[17]
D. Probert and J. Bruno. Building fundamentally extensible application-specific operating system in SPACE. Technical Report TR95-06, Computer Science Department, University of California Santa Barbara, Oakland, CA, May 1995.

[18]
D. M. Ritchie and K. Thompson. The UNIX time-sharing system. Communications of the ACM, 17(7):365--375, July 1974.

[19]
T. Roscoe. Linkage in the Nemesis single address space operating system. Operating Systems Review, 28(4):48--55, Oct. 1994.

[20]
T. Roscoe. The Structure of a Multi-Service Operating System. PhD thesis, University of Cambridge Computer Laboratory, April 1995.

[21]
J. Rushby. The design and verification of secure systems. In Proceedings of the 8th ACM Symposium on Operating System Principles, Asilomar CA, pages 12--21, 1981.

[22]
C. L. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, and D. Zamboni. Analysis of denial of service attacks on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997. Oakland, California, pages 208--223, Los Alamitos, CA, USA, May 1997. IEEE Computer Society Press.

[23]
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In 2nd Symposium on Operating Systems Design and Implementation (OSDI '96), October 28--31, 1996. Seattle, WA, pages 213--227, Berkeley, CA, USA, Oct. 1996. USENIX.

[24]
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of 14th ACM SOSP, pages 175--188, Asheville, NC, Dec. 1993.


Previous Up Previous Contents References