Anonymous, “Apache suEXEC Support,” (describes the Apache HTTP Server Version 1.3 dating from Jun. 5, 1998 as documented in Written Opinion for PCT Application No. PCT/US99/12912), http://www.apache.org/docs/suexec.html printed Jul. 24, 2000. |
Anonymous, “Apache Virtual Host documentation,” (describes the Apache HTTP Server Version 1.3 dating from Jun. 5, 1998 as documented in Written Opinion for PCT Application No. PCT/US99/12912), http://www.apache.org/docs/vhosts/index.html, printed Jul. 24, 2000. |
Bell Telephone Laboratories Incorporated, UNIX™ Time-Sharing System: UNIX Programmer's Manual, 7th Edition, vol. 1, Chmod(1), Su(1), Exec(2) (Jan. 1979). |
“Java Security Model: Java Protection Domains,” http://java.sun.com/security/handout.html, printed Nov. 11, 1999. |
Anon, “Privilege Control Mechanism for UNIX Systems,” IBM Technical Disclosure Bulletin, vol. 34, No. 7b pp. 477-479, Dec. 1991. |
Erdos et al., “Security Reference Model for the Java Developer's Kit 1.0.2,” Java Security Reference Model, Nov. 13, 1996, http://www.javasoft.com/security/SRM.html printed Jul. 14, 1999. |
Fritzinger et al., “Java Security,” 1996, http://java.sun.com/security/whitepaper.txt. |
Fritzinger et al., “Java Security,” 1996, http://java.sun.com/security/whitepaper.ps. |
Goldberg et al., “A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker,” Sixt USENIX Security Symposium, Jul. 22-25, 1996, http://www.usenix.org/publications/library/proceedings/sec9. |
Goldstein, Ted, “The Gateway Security Model in the Java Commerce Client,” The Source for Java ™Technology, 1997, http://www.java.sun,com/products/commerce/docs/whitepapers/security/JCC_gateway,html printed Jul. 14, 1999. |
Mazieres, David and M. Frans Kaashoek, “Secure Applications Need Flexible Operating Systems,” 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), May 5-6, 1997, http://www.eecs.harvard.edu/hotos/. |
Neuman et al., “Kerberos: An Authentication Service for Computer Networks,” IEEE Communicaitons Magazine, pp. 33-38, Sep. 1, 1994. |
Copy of International Search Report in Corresponding PCT Application No. PCT/US99/12913. |
Soshi et al., The Saga Security System: A Security Architecture for Open Distributed Systems, IEEE, pp. 53-58 (1997). |
Asche, Ruediger R., “The Guts of Security”, pp. 1-19 (May 9, 1995), http://msdn.microsoft.com/library/techart/medn secguts.htm, printed May 28, 2001. |
Asche, Ruediger R., “Windows Security in Theory and Practice”, pp. 1-10 (May 9, 1995), http://msdn.microsoft.com/library/techart/medn seccpp.htm, printed May 28, 2001. |
Frost, J., “Windows NT Security”, pp. 1-6 (May 4, 1995), http://world.std.com/˜jimf/papers/nt-security/nt-security.html, printed May 28, 2001. |