Author:
Creado Orhio Mark,Le Phu Dung,Newmarch Jan,Tan Jeff
Reference16 articles.
1. Martin Abadi and Ted Wobber. A logical account of NGSCB. In David Frutos-Escrig and Manuel Nunez, editors, Lecture Notes in Computer Science, volume 3235, pages 1-12–. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30232-2_1, last viewed December 2012.
2. Sergey Bratus, Peter C. Johnson, Ashwin Ramaswamy, Sean W. Smith, and Michael E. Locasto. The cake is a lie: privilege rings as a policy resource. In Proceedings of the 1st ACM workshop on Virtual machine security, pages 33-38, Chicago, Illinois, USA, 2009. ACM.
3. Aleksander Budzynowski and Gernot Heiser. The von neumann architecture is due for retirement. In Proceedings of the 14th USENIX Conference on Hot Topics in Operating Systems, HotOS’13, pages 25-25, Berkeley, CA, USA, 2013. USENIX Association. http://dl.acm.org/citation.cfm? id=2490483.2490508, last viewed December 2014.
4. The ideal computing system framework - a novel security paradigm;Creado;The SIJ Transactions on Computer Science Engineering & its Applications (CSEA),2014
5. Monitors: an operating system structuring concept;Hoare;Commun. ACM,1974