Dan Sugalski wrote:
> 
> If we're going to tackle this, though, we need to pull in some folks 
> who're actually competent at it before we do more than handwave about 
> the design.

A Language-Based Approach to Security (2000)
http://citeseer.ist.psu.edu/schneider00languagebased.html

Linux Security Modules: General Security Support for the Linux Kernel (2002)
http://citeseer.ist.psu.edu/wright02linux.html

The Three Security Architectures
http://www.canonical.org/%7Ekragen/3-sec-arch.html

Capability Security Model
http://www.erights.org/elib/capability/index.html
http://www.erights.org/elib/capability/duals/myths.html

Code Access Security in .Net
http://msdn.microsoft.com/msdnmag/issues/02/09/SecurityinNET/

Blogs of the primary CLR CAS developers
http://blogs.gotdotnet.com/gregfee
http://blogs.dotnetthis.com/Ivan/

Java vs. .NET Security, Parts 1 + 2
http://www.onjava.com/pub/a/onjava/2003/11/26/javavsdotnet.html
http://www.onjava.com/pub/a/onjava/2003/12/10/javavsdotnet.html

--
Garrett Goebel
IS Development Specialist 

ScriptPro                   Direct: 913.403.5261 
5828 Reeds Road               Main: 913.384.1008 
Mission, KS 66202              Fax: 913.384.2180 
www.scriptpro.com          garrett at scriptpro dot com 
 

Reply via email to