Cowan, C., Beattie, S., Kroah-Hartman, G., Pu, C., Wagle,
P. & Gligor, V. (2000) SubDomain: Parsimonious
Server Security. USENIX 14th Systems Administration
Conference (LISA).
Department of Defense (1985) Trusted Computer Security
Evaluation Criteria. DOD 5200.28-STD.
Ferraiolo, D., Cugini, J. A. & Kuhn, R. (1995) Role-Based
Access Control (RBAC): Features and Motivations.
Annual Computer Security Applications Conference.
Gaithersburg, MD, USA, IEEE Computer Society
Press.
Ferraiolo, D. & Kuhn, R. (1992) Role-Based Access
Control. 15th National Computer Security Conference.
Baltimore, MD, USA.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R. &
Chandramouli, R. (2001) Proposed NIST Standard for
Role-Based Access Control. ACM Transactions on
Information and System Security, 4, 224–274.
Garfinkel, T. (2003) Traps and Pitfalls: Practical Problems
in System Call Interposition Based Security Tools.
Proceedings of the 10th Network and Distributed
System Security Symposium. February ed. San Diego,
CA, USA, Stanford University.
Goldberg, I., Wagner, D., Thomas, R. & Brewer, E. A.
(1996) A Secure Environment for Untrusted Helper
Applications: Confining the Wily Hacker.
Proceedings of the 6th USENIX Security Symposium.
San Jose, CA, USA, University of California.
Hinrichs, S. & Naldurg, P. (2006) Attack-based Domain
Transition Analysis. 2nd Annual Security Enhanced
Linux Symposium. Baltimore, Md., USA.
Jaeger, T., Sailer, R. & Zhang, X. (2003) Analyzing
Integrity Protection in the SELinux Example Policy.
Proceedings of the 12th USENIX Security Symposium,
59–74.
Kamp, P.-H. & Watson, R. (2000) Jails: Confining the
Omnipotent Root. Sane 2000 - 2nd International
SANE Conference.
Kamp, P.-H. & Watson, R. (2004) Building Systems to be
Shared Securely. ACM Queue, 2, 42-51.
Krohn, M., Efstathopoulos, P., Frey, C., Kaashoek, F.,
Kohler, E., Mazieres, D., Morris, R., Osborne, M.,
Vandebogart, S. & Ziegler, D. (2005) Make least
privilege a right (not a privilege). Procedings of 10th
Hot Topics in Operating Systems Symposium (HotOS-
X). Santa Fe, NM, USA.
Krsti, I. & Garfinkel, S. L. (2007) Bitfrost: the one laptop
per child security model. ACM International
Conference Proceeding Series, 229, 132-142.
Madnick, S. E. & Donovan, J. J. (1973) Application and
Analysis of the Virtual Machine Approach to
Information Security. Proceedings of the ACM
Workshop on Virtual Computer Systems. Cambridge,
MA, USA.
Marceau, C. & Joyce, R. (2005) Empirical Privilege
Profiling. Proceedings of the 2005 Workshop on New
Security Paradigms, 111-118.
Miller, M. S. & Shapiro, J. (2003) Paradigm Regained:
Abstraction Mechanisms for Access Control. 8th
Asian Computing Science Conference (ASIAN03),
224–242.
Miller, M. S., Tulloh, B. & Shapiro, J. S. (2004) The
structure of authority: Why security is not a separable
concern. Multiparadigm Programming in Mozart/Oz:
Proceedings of MOZ, 3389.
Ott, A. (2002) The Role Compatibility Security Model.
7th Nordic Workshop on Secure IT Systems.
Provos, N. (2002) Improving Host Security with System
Call Policies. 12th USENIX Security Symposium.
Washington, DC, USA, USENIX.
Raje, M. (1999) Behavior-based Confinement of
Untrusted Applications. TRCS 99-12. Department of
Computer Science. Santa Barbara, University of
Calfornia.
Stiegler, M., Karp, A. H., Yee, K. P., Close, T. & Miller,
M. S. (2006) Polaris: virus-safe computing for
Windows XP. Communications of the ACM, 49, 83-
88.
Tucker, A. & Comay, D. Solaris Zones: Operating System
Support for Server Consolidation. 3rd Virtual Machine
Research and Technology Symposium Works-in-
Progress.
Wagner, D. (2006) Object capabilities for security.
Conference on Programming Language Design and
Implementation: Proceedings of the 2006 workshop on
Programming languages and analysis for security, 10,
1-2.
Wagner, D. A. (1999) Janus: An Approach for
Confinement of Untrusted Applications. Technical
Report: CSD-99-1056. Electrical Engineering and
Computer Sciences. Berkeley, USA, University of
California.
Whitaker, A., Shaw, M. & Gribble, S. D. (2002) Denali:
Lightweight virtual machines for distributed and
networked applications. Proceedings of the 5th
USENIX Symposium on Operating Systems Design
and Implementation, 195–209.
Wright, C., Cowan, C., Smalley, S., Morris, J. & Kroah-
Hartman, G. (2002) Linux Security Module
Framework. Ottawa Linux Symposium. Ottawa
Canada.
FUNCTIONALITY-BASED APPLICATION CONFINEMENT - Parameterised Hierarchical Application Restrictions
77