1. M. Abadi, E. Wobber, M. Burrows, and B. Lampson .Authentication in the Taos Operating System. In Proceedings of the 14th ACM Symposium on Operating System Principles, pp.256 -269 ,Asheville, NC,1993 . DOI: 10.1145/168619.16864010.1145/168619.168640
2. A. Acharya, and M. Raje .MAPbox: Using parameterized behavior classes to confine untrusted applications . InProceedings of the 9th USENIX Security Symposium,August2000 .
3. W. B. Ackerman, and W. W. Plummer .An implementation of a multiprocessing computer system . InProceedings of the First ACM Symposium on Operating Systems Principles,1967 . DOI: 10.1145/800001.81166610.1145/800001.811666
4. A. Alexandrov, P. Kmiec, and K. Schauser .Consh: A confined execution environment for internet computations . InProceedings of the 1999 USENIX Annual Technical Conference,1999 .