Fred B. Schneider

Results: 85



#Item
1IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson†  Fred B. Schneider

IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson† Fred B. Schneider

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2003-11-23 23:38:35
    2Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

    Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2011-10-27 11:53:48
      3Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

      Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

      Add to Reading List

      Source URL: www.cs.cornell.edu

      - Date: 2009-12-11 23:31:04
        4Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

        Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

        Add to Reading List

        Source URL: www.sigops.org

        - Date: 2011-09-18 14:34:30
          5Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

          Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

          Add to Reading List

          Source URL: www.sigops.org

          - Date: 2011-09-20 03:37:00
            6Quantifying Information Flow with Beliefs Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

            Quantifying Information Flow with Beliefs Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

            Add to Reading List

            Source URL: www.cs.cornell.edu

            Language: English - Date: 2013-01-07 14:07:10
              7Belief in Information Flow Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

              Belief in Information Flow Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

              Add to Reading List

              Source URL: www.cs.cornell.edu

              Language: English - Date: 2013-01-07 14:08:26
                8Device Driver Safety Through a Reference Validation Mechanism ∗ Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G¨un Sirer, Fred B. Schneider Cornell University Abstract Device drivers typically execute in superviso

                Device Driver Safety Through a Reference Validation Mechanism ∗ Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G¨un Sirer, Fred B. Schneider Cornell University Abstract Device drivers typically execute in superviso

                Add to Reading List

                Source URL: piki.org

                Language: English - Date: 2008-12-13 13:45:10
                  9Nexus Authorization Logic (NAL): Design Rationale and Applications ¨ SIRER, Cornell University FRED B. SCHNEIDER, KEVIN WALSH, and EMIN GUN Nexus Authorization Logic (NAL) provides a principled basis for specifying and

                  Nexus Authorization Logic (NAL): Design Rationale and Applications ¨ SIRER, Cornell University FRED B. SCHNEIDER, KEVIN WALSH, and EMIN GUN Nexus Authorization Logic (NAL) provides a principled basis for specifying and

                  Add to Reading List

                  Source URL: www.cs.cornell.edu

                  Language: English - Date: 2011-08-20 15:34:11