Building a trusted computing base
Application and Server Security
75.
Securing Servers
76.
Server Architecture Examples
77.
GRID Examples with small setuid programs
82.
Polaris - an ACL restricting Sandbox
83.
Application Structure and Modularity