SASI Enforcement of Security Policies: A Retrospective
dc.contributor.author | Erlingsson, Ulfar | en_US |
dc.contributor.author | Schneider, Fred B. | en_US |
dc.date.accessioned | 2007-04-23T18:18:18Z | |
dc.date.available | 2007-04-23T18:18:18Z | |
dc.date.issued | 1999-07 | en_US |
dc.description.abstract | SASI enforces security policies by modifying object code for a target system before that system is executed. The approach has been prototyped for two rather different machine architectures: Intel x86 and Java JVML. Details of these prototypes and some generalizations about the SASI approach are discussed. | en_US |
dc.format.extent | 404803 bytes | |
dc.format.extent | 1031951 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/postscript | |
dc.identifier.citation | http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR99-1758 | en_US |
dc.identifier.uri | https://hdl.handle.net/1813/7412 | |
dc.language.iso | en_US | en_US |
dc.publisher | Cornell University | en_US |
dc.subject | computer science | en_US |
dc.subject | technical report | en_US |
dc.title | SASI Enforcement of Security Policies: A Retrospective | en_US |
dc.type | technical report | en_US |