共 50 条
- [1] A secure jailing system for confining untrusted applications SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
- [2] Secure isolation of untrusted legacy applications USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2007, : 117 - 130
- [3] Providing secure environments for untrusted network applications SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 277 - 283
- [4] Providing secure environments for untrusted network applications Journal of Engineering and Applied Science, 1997, : 277 - 283
- [5] A secure environment for untrusted helper applications - Confining the wily hacker PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 1 - 13
- [6] A secure run of an untrusted program code in the PIVO system ELEKTROTEHNISKI VESTNIK, 2021, 88 (1-2): : 54 - 60
- [7] Secure fingerprint authentication system on an untrusted computing environment TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 299 - 310
- [8] A secure run of an untrusted program code in the PIVO system 1600, Electrotechnical Society of Slovenia (88): : 54 - 60
- [10] AppGuard: A Hardware Virtualization Based Approach on Protecting User Applications from Untrusted Commodity Operating System 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 685 - 689