And don't forget the Paul Karger paper from Oakland, which applies access
controls to executables and effectively provides implementations for
Saltzer-Schroeder's least privilege and more:

@InProceedings{Karger87, 
Key="Karger", Author="P.A. Karger", 
Title="Limiting the Damage Potential of Discretionary {T}rojan Horses", 
BookTitle="Proceedings of the 1987 Symposium on Security and Privacy", 
Organization="IEEE Computer Society",
Address="Oakland, California", Year="1987", Month="April", pages="32--37"}

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to