{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:08:43Z","timestamp":1769116123347,"version":"3.49.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"9","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,9]]},"abstract":"<jats:p>It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.<\/jats:p>","DOI":"10.1145\/1151030.1151033","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T18:11:32Z","timestamp":1161195092000},"page":"83-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Polaris"],"prefix":"10.1145","volume":"49","author":[{"given":"Marc","family":"Stiegler","sequence":"first","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Alan H.","family":"Karp","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Ka-Ping","family":"Yee","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Tyler","family":"Close","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Mark S.","family":"Miller","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Shatter-proofing Windows. In Black Hat USA 2005 (Las Vegas","author":"Close T.","unstructured":"Close , T. , Stiegler , M. , and Karp , A . Shatter-proofing Windows. In Black Hat USA 2005 (Las Vegas , July 23, 2005); www.blackhat.com\/presentations\/bh-usa-05\/BH_US_05-Close\/tylerclose_whitepaper_US05.pdf. Close, T., Stiegler, M., and Karp, A. Shatter-proofing Windows. In Black Hat USA 2005 (Las Vegas, July 23, 2005); www.blackhat.com\/presentations\/bh-usa-05\/BH_US_05-Close\/tylerclose_whitepaper_US05.pdf."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016998.1017001"},{"key":"e_1_2_1_3_1","volume-title":"Java Web Start: Developing and Distributing Java Applications for the Client Side. White Paper","author":"Kim S.","year":"2001","unstructured":"Kim , S. Java Web Start: Developing and Distributing Java Applications for the Client Side. White Paper , IBM Corp. Armonk, NY , Sept. 1, 2001 ; www-106.ibm.com\/developerworks\/java\/library\/j-webstart\/. Kim, S. Java Web Start: Developing and Distributing Java Applications for the Client Side. White Paper, IBM Corp. Armonk, NY, Sept. 1, 2001; www-106.ibm.com\/developerworks\/java\/library\/j-webstart\/."},{"key":"e_1_2_1_4_1","volume-title":"Securing Java: Getting Down to Business with Mobile Code","author":"McGraw G.","year":"1999","unstructured":"McGraw , G. and Felten , E . Securing Java: Getting Down to Business with Mobile Code , 2 nd Edition. John Wiley & Sons, Inc. , New York , 1999 . McGraw, G. and Felten, E. Securing Java: Getting Down to Business with Mobile Code, 2nd Edition. John Wiley & Sons, Inc., New York, 1999.","edition":"2"},{"key":"e_1_2_1_5_1","unstructured":"Microsoft Corp. 10 Immutable Laws of Security. Redmond WA; www.microsoft.com\/technet\/archive\/community\/columns\/security\/essays\/10imlaws.mspx.  Microsoft Corp. 10 Immutable Laws of Security. Redmond WA; www.microsoft.com\/technet\/archive\/community\/columns\/security\/essays\/10imlaws.mspx."},{"key":"e_1_2_1_6_1","volume-title":"Windows Security Access Control.","author":"Microsoft Corp.","year":"2005","unstructured":"Microsoft Corp. Developer Best Practices and Guidelines for Applications in a Least Privileged Environment: Understanding User Account Protection in Microsoft Windows Vista Beta 1 , Windows Security Access Control. Redmond, WA , Sept. 2005 ; msdn.microsoft.com\/windowsvista\/ default.aspx?pull=\/library\/en-us\/dnlong\/html\/AccProtVista.asp. Microsoft Corp. Developer Best Practices and Guidelines for Applications in a Least Privileged Environment: Understanding User Account Protection in Microsoft Windows Vista Beta 1, Windows Security Access Control. Redmond, WA, Sept. 2005; msdn.microsoft.com\/windowsvista\/ default.aspx?pull=\/library\/en-us\/dnlong\/html\/AccProtVista.asp."},{"key":"e_1_2_1_7_1","volume-title":"Black Hat 2003 (Las Vegas","author":"Paget C.","unstructured":"Paget , C. Click next to continue . In Black Hat 2003 (Las Vegas , July 2003); blackhat.com\/html\/bh-media-archives\/bh-archives-2003. html#USA-2003. Paget, C. Click next to continue. In Black Hat 2003 (Las Vegas, July 2003); blackhat.com\/html\/bh-media-archives\/bh-archives-2003. html#USA-2003."},{"key":"e_1_2_1_8_1","volume-title":"Advances in Financial Cryptography","author":"Stiegler M.","year":"2005","unstructured":"Stiegler , M. An introduction to petname systems . In Advances in Financial Cryptography , Volume 2 , I. Grigg , Ed ., 2005 ; www.financialcryptography.com\/mt\/archives\/000499.html. Stiegler, M. An introduction to petname systems. In Advances in Financial Cryptography, Volume 2, I. Grigg, Ed., 2005; www.financialcryptography.com\/mt\/archives\/000499.html."},{"key":"e_1_2_1_10_1","volume-title":"Washington","author":"General Accounting Office","year":"2004","unstructured":"U.S. General Accounting Office . Technology Assessment: Cybersecurity for Critical Infrastructure Protection. GAO-04-321 , Washington , D.C. , May 2004 , 27. U.S. General Accounting Office. Technology Assessment: Cybersecurity for Critical Infrastructure Protection. GAO-04-321, Washington, D.C., May 2004, 27."},{"key":"e_1_2_1_11_1","volume-title":"Cyber Extortion Attack","author":"Websense Security Laboratories","year":"2005","unstructured":"Websense Security Laboratories . Cyber Extortion Attack . May 2005 ; www.websensesecuritylabs.com\/alerts\/alert.php?AlertID=194. Websense Security Laboratories. Cyber Extortion Attack. May 2005; www.websensesecuritylabs.com\/alerts\/alert.php?AlertID=194."},{"key":"e_1_2_1_12_1","first-page":"290","volume":"278","author":"Yee K.-P.","year":"2002","unstructured":"Yee , K.-P. User interaction design for secure systems. In Proceedings of the Fourth International Conference on Information and Communications Security (Singapore, Dec .). Springer-Verlag , 2002 , 278 -- 290 . Yee, K.-P. User interaction design for secure systems. In Proceedings of the Fourth International Conference on Information and Communications Security (Singapore, Dec.). Springer-Verlag, 2002, 278--290.","journal-title":"Springer-Verlag"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/66093.66095"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40965-6_15"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1151030.1151033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T18:39:01Z","timestamp":1672252741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1151030.1151033"}},"subtitle":["virus-safe computing for Windows XP"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":14,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1151030.1151033"],"URL":"https:\/\/doi.org\/10.1145\/1151030.1151033","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}