Frost, J. “Windows NT Security”, pp. 1-6, dated May 4, 1995 retrieved form the Internet <http://world.std.com/˜jimf/papers/nt-security/nt-security.html> on May 28, 2001.* |
Asche, Ruediger R., “The Guts of Security”, pp. 1-19, dated May 9, 1995, retrieved from the Internet <http://msdn.microsoft.com/library/techart/medn-secguts.htm> on May 28, 2001.* |
Asche, Ruediger R. “Windows Security in Theory and Practice”, pp. 1-10, dated May 9, 1995, retrieved from the Internet <http://msdn.microsoft.com/library/techart/msdn-seccpp.htm> on May 28, 2001.* |
Soshi et al., The Saga Security System: A Security Architecture for Open Distributed Systems, IEEE, pp 53-5 (1997). |
Anonymous, “Apache suEXEC Support,” (describes the Apache HTTP Server Version 1.3 dating from Jun. 5, 1998 as documented in Written Opinion for PCT Application No. PCT/US99/12912), http://www.apache.org/docs/suexec.html printed Jul. 24, 2000. |
Anonymous, “Apache Virtual Host documentation,” (describes the Apache HTTP Server Version 1.3 dating fr Jun. 5, 1998 as documented in Written Opinion for PCT Application No. PCT/US99/12912), http://www.apache.org/docs/vhosts/index.html, printed Jul. 24, 2000. |
Bell Telephone Laboratories Incorporated, UNIX™ Time-Sharing System: UNIX Programmer's Manual, 7th Edition, vol. 1, Chmod(1), SU(1), Exec(2) (Jan. 1979). |
Copy of Written Opinion in Corresponding PCT Application No. PCT/ US99/12912 dated Mar. 3, 2000. |
Copy of International Search Report in Corresponding PCT Application No. PCT/US99/12912 dated May 11, 1999. |
“Java Security Model: Java Protection Domains,” http://java.sun.com/security/handout.html, printed Nov. 11, 1999. |
Anon, “Privilege Control Mechanism for UNIX Systems,” IBM Technical Disclosure Bulletin, vol. 34, No. 7b pp. 477-479, Dec. 1991. |
Erdos et al., “Security Reference Model for the Java Developer's Kit 1.0.2,” Java Security Reference Model, Nov. 13, 1996, http://www.javasoft.com/security/SRM.html printed Jul. 14, 1999. |
Fritzinger et al., “Java Security,” 1996, http://java.sun.com/security/whitepaper.txt. |
Fritzinger et al., “Java Security,” 1996, http://java.sun.com/security/whitepaper.ps. |
Goldberg et al., “A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker,” Sixt USENIX Security Symposium, Jul. 22-25, 1996, http://www.usenix.org/publications/library/proceedings/sec9. |
Goldstein, Ted, “The Gateway Security Model in the Java Commerce Client,” The Source for Java198Technology, 1997, http://www.java.com/products/commerce/docs/whitepapers/security/JCC-gateway.html printed Jul. 14, 1999. |
Maziers, David and M. Frans Kaashoek, “Secure Applications Need Flexible Operating Systems,” 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), May 5-6, 1997, http://www.eecs.harvard.edu/hotos/. |
Neuman et al., “Kerberos: An Authentication Service for Computer Networks,” IEEE Communicaitons Magazine, pp. 33-38, Sep. 1, 1994. |