References
References
- [1]
-
R. Atkinson.
RFC 1825 - Security Architecture for the Internet Protocol.
IETF, August 1995.
- [2]
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghigha.
A domain and type enforcement UNIX prototype.
In Proceedings of the fifth USENIX UNIX Security Symposium:
June 5--7, 1995, Salt Lake City, Utah, USA, pages 127--140, Berkeley, CA,
USA, June 1995. USENIX.
- [3]
-
M. L. Bailey, B. Gopal, M. A. Pagels, L. L. Peterson, and P. Sarkar.
PATHFINDER: A pattern-based packet classifier.
In Proceedings of the First Symposium on Operating Systems
Design and Implementation, pages 115--123, 1994.
- [4]
-
B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski,
C. Chambers, and S. Eggers.
Extensibility, safety and performance in the spin operating system.
In Proceedings of the 15th ACM Symposium on Operating System
Principles (SOSP-15), pages 267--284.
- [5]
-
B. N. Bershad, T. E. Anderson, E. D. Lazowska, and H. M. Levy.
Lightweight remote procedure calls.
ACM Transactions on Computer Systems, TOCS, 8(1):37--55, Feb.
1990.
- [6]
-
J. Chase, H. Levy, M. Baker-Harvey, and E. Lazowska.
Opal: A single address space system for 64-bit architectures.
In Proceedings of the Fourth Workshop on Workstation Operating
Systems, pages 80--85, 1993.
- [7]
-
T. Dierks and C. Allen.
Internet Draft: The TLS Protocol Version 1.0.
IETF, November 1997.
- [8]
-
P. Druschel and L. L. Peterson.
Fbufs: A high-bandwidth cross-domain transfer facility.
In Proceedings of the 14th Symposium on Operating Systems
Principles, pages 189--202, New York, NY, USA, Dec. 1993. ACM Press.
- [9]
-
Y. Endo, J. Gwertzman, M. Seltzer, C. Small, K. A. Smith, and D. Tang.
VINO: The 1994 fall harvest.
Technical Report TR-34-94, Harvard University, Cambridge, MA, 1994.
- [10]
-
B. Ford and J. Lepreau.
Evolving mach 3.0 to a migrating thread model.
In Proceedings of the Winter 1994 USENIX Technical Conference
and Exhibition, pages 97--114, Jan. 1994.
- [11]
-
G. Heiser, K. Elphinstone, S. Russell, and J. Vochteloo.
Mungi: A distributed single address-space operating system.
Technical Report SCS&E Report 9314, University of New South Wales,
Australia, Nov. 1993.
- [12]
-
D. Mosberger.
Message library design notes.
Technical Report TR97-19, The Department of Computer Science,
University of Arizona, Tuesday, Nov. 25 1997.
- [13]
-
D. Mosberger and L. L. Peterson.
Making paths explicit in the scout operating system.
In 2nd Symposium on Operating Systems Design and Implementation
(OSDI '96), October 28--31, 1996. Seattle, WA, pages 153--167, Berkeley,
CA, USA, Oct. 1996. USENIX.
- [14]
-
S. J. Mullender, I. M. Leslie, and D. McAuley.
Operating system support for distributed multimedia.
In Proceedings of the Summer 1994 USENIX Conference: June
6--10, 1994, Boston, Massachusetts, USA, pages 209--219, Berkeley, CA,
USA, Summer 1994. USENIX.
- [15]
-
G. C. Necula.
Proof-carrying code.
In Conference Record of POPL '97: The 24th ACM
SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages
106--119, Paris, France, 15--17 Jan. 1997.
- [16]
-
P. G. Neumann.
Architectures and formal representations for secure systems.
Technical Report SRI-CSL-96-05, Computer Science Laboratory, SRI
International, Menlo Park, CA, May 1996.
- [17]
-
D. Probert and J. Bruno.
Building fundamentally extensible application-specific operating
system in SPACE.
Technical Report TR95-06, Computer Science Department, University of
California Santa Barbara, Oakland, CA, May 1995.
- [18]
-
D. M. Ritchie and K. Thompson.
The UNIX time-sharing system.
Communications of the ACM, 17(7):365--375, July 1974.
- [19]
-
T. Roscoe.
Linkage in the Nemesis single address space operating system.
Operating Systems Review, 28(4):48--55, Oct. 1994.
- [20]
-
T. Roscoe.
The Structure of a Multi-Service Operating System.
PhD thesis, University of Cambridge Computer Laboratory, April 1995.
- [21]
-
J. Rushby.
The design and verification of secure systems.
In Proceedings of the 8th ACM Symposium on Operating System
Principles, Asilomar CA, pages 12--21, 1981.
- [22]
-
C. L. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, and D. Zamboni.
Analysis of denial of service attacks on TCP.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, May 4-7, 1997. Oakland, California, pages 208--223, Los Alamitos,
CA, USA, May 1997. IEEE Computer Society Press.
- [23]
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith.
Dealing with disaster: Surviving misbehaved kernel extensions.
In 2nd Symposium on Operating Systems Design and Implementation
(OSDI '96), October 28--31, 1996. Seattle, WA, pages 213--227, Berkeley,
CA, USA, Oct. 1996. USENIX.
- [24]
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham.
Efficient software-based fault isolation.
In Proceedings of 14th ACM SOSP, pages 175--188, Asheville, NC,
Dec. 1993.