메뉴 건너뛰기




Volumn 197, Issue 1, 2008, Pages 3-16

A Virtual Machine Based Information Flow Control System for Policy Enforcement

Author keywords

Information Flow; Policy Enforcement; Run time Monitoring

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CONTROL; JAVA PROGRAMMING LANGUAGE;

EID: 39149090024     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.10.010     Document Type: Article
Times cited : (54)

References (22)
  • 1
    • 85084162270 scopus 로고    scopus 로고
    • R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th Usenix Security Symposium, San Diego, California, August 2004
    • R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th Usenix Security Symposium, San Diego, California, August 2004
  • 2
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning D.E. A lattice model of secure information flow. Communications of the ACM 19 5 (1976) 236-243
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 4
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communications of the ACM 20 7 (1977) 504-513
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 5
    • 84888352157 scopus 로고    scopus 로고
    • N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres, Making information flow explicit in HiStar, Proc. 7th Symposium on Operating Systems Design and Implementation, pp. 263-278, 2006
    • N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres, Making information flow explicit in HiStar, Proc. 7th Symposium on Operating Systems Design and Implementation, pp. 263-278, 2006
  • 6
    • 0003801299 scopus 로고    scopus 로고
    • Inside Java 2 Platform Security: Architecture, API Design, and Implementation
    • Addison-Wesley, Reading, MA, USA
    • Gong L. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. The Java Series (1999), Addison-Wesley, Reading, MA, USA
    • (1999) The Java Series
    • Gong, L.1
  • 7
    • 39149100506 scopus 로고    scopus 로고
    • Kaffe.org (2007). http://www.kaffe.org/
    • (2007)
    • Kaffe.org1
  • 9
    • 39149083614 scopus 로고    scopus 로고
    • E. Gluzberg and S. Fink, An Evaluation of Java System Services with Microbenchmarks, IBM Research Report RC 21715 2/3/2000, 2000
    • E. Gluzberg and S. Fink, An Evaluation of Java System Services with Microbenchmarks, IBM Research Report RC 21715 2/3/2000, 2000
  • 11
    • 39149125662 scopus 로고    scopus 로고
    • J.S. Fenton, Information protection systems, PhD. Thesis, University of Cambridge, 1973
    • J.S. Fenton, Information protection systems, PhD. Thesis, University of Cambridge, 1973
  • 12
    • 39149117242 scopus 로고    scopus 로고
    • I. Gat and H.J. Saal, Memoryless execution: a programmer's viewpoint, IBM Tech. Rep. 025, IBM Israeli Scientific Center, 1975
    • I. Gat and H.J. Saal, Memoryless execution: a programmer's viewpoint, IBM Tech. Rep. 025, IBM Israeli Scientific Center, 1975
  • 13
    • 39149097388 scopus 로고    scopus 로고
    • J. Brown and T.F. King Jr, A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow, Tech. Report ARIES-TM-015, MIT, 2001
    • J. Brown and T.F. King Jr, A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow, Tech. Report ARIES-TM-015, MIT, 2001
  • 14
    • 39149135427 scopus 로고    scopus 로고
    • D.E. Denning, Secure information flow in computer systems, Ph.D. Thesis, Purdue U., CSD TR 145, 1975
    • D.E. Denning, Secure information flow in computer systems, Ph.D. Thesis, Purdue U., CSD TR 145, 1975
  • 15
    • 21644475650 scopus 로고    scopus 로고
    • N. Vachharajani, M.J. Bridges, J. Chang, R. Rangan, G. Ottoni, J.A. Blome, G.A. Reis, M. Vachharajani and D.I. August, RIFLE: An Architectural Framework for User-Centric Information-Flow Security, Proceedings of the 37th International Symposium on Microarchitecture, 2004
    • N. Vachharajani, M.J. Bridges, J. Chang, R. Rangan, G. Ottoni, J.A. Blome, G.A. Reis, M. Vachharajani and D.I. August, RIFLE: An Architectural Framework for User-Centric Information-Flow Security, Proceedings of the 37th International Symposium on Microarchitecture, 2004
  • 16
    • 17644378117 scopus 로고    scopus 로고
    • Y. Beres, C.I. Dalton, Dynamic label binding at run-time, Proceedings of the 2003 Workshop on New security paradigms, pp. 39-46, 2003
    • Y. Beres, C.I. Dalton, Dynamic label binding at run-time, Proceedings of the 2003 Workshop on New security paradigms, pp. 39-46, 2003
  • 17
    • 39149095820 scopus 로고    scopus 로고
    • D. Chandra, Information Flow Analysis and Enforcement in Java Bytecode, Ph.D. Thesis, University of California, Irvine, 2006
    • D. Chandra, Information Flow Analysis and Enforcement in Java Bytecode, Ph.D. Thesis, University of California, Irvine, 2006
  • 18
    • 39149100837 scopus 로고    scopus 로고
    • V. Haldar, D. Chandra and M. Franz, Practical, Dynamic Information Flow for Virtual Machines, 2nd International Workshop on Programming Language Interference and Dependence, 2005
    • V. Haldar, D. Chandra and M. Franz, Practical, Dynamic Information Flow for Virtual Machines, 2nd International Workshop on Programming Language Interference and Dependence, 2005
  • 19
    • 39149103267 scopus 로고    scopus 로고
    • U. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Cornell U., 2004
    • U. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Cornell U., 2004
  • 21
    • 39149104866 scopus 로고    scopus 로고
    • J. Newsome and D.X. Song, Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software, 12th Network and Distributed System Security Symposium, 2005
    • J. Newsome and D.X. Song, Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software, 12th Network and Distributed System Security Symposium, 2005
  • 22
    • 0032646625 scopus 로고    scopus 로고
    • A.C. Myers, JFlow: Practical Mostly-Static Information Flow Control, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228-241, San Antonio, Texas, 1999
    • A.C. Myers, JFlow: Practical Mostly-Static Information Flow Control, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228-241, San Antonio, Texas, 1999


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.