메뉴 건너뛰기




Volumn , Issue , 2007, Pages 321-334

Information flow control for standard os abstractions

Author keywords

DIFC; Distributed information flow control; Endpoints; Reference monitor; System call interposition; Web services

Indexed keywords

DATA FLOW; DECENTRALIZED INFORMATION FLOW CONTROL; DESCRIPTORS; DISTRIBUTED INFORMATION; DISTRIBUTED INFORMATION FLOW CONTROL; INFORMATION FLOW CONTROL; MOIN-MOIN; OPERATING SYSTEMS; PRIVATE DATA; REFERENCE MONITORS; SAFE OPERATION; SECURITY CODES; SECURITY POLICY; SECURITY VIOLATIONS; SYSTEM CALLS; WEB APPLICATION;

EID: 57749192483     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (210)

References (38)
  • 1
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • Technical Report MTR-2997, Rev. 1, MITRE Corp, Bedford, MA, March
    • D. E. Bell and L. L. Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
    • (1976)
    • Bell, D.E.1    Padula, L.L.2
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report MTR-3153, Rev. 1, MITRE Corp, Bedford, MA
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Rev. 1, MITRE Corp., Bedford, MA, 1976.
    • (1976)
    • Biba, K.J.1
  • 3
    • 47149116213 scopus 로고    scopus 로고
    • Toward secure services from untrusted developers
    • Technical Report TR-2007-041, MIT CSAIL, Aug
    • M. Brodsky et al. Toward secure services from untrusted developers. Technical Report TR-2007-041, MIT CSAIL, Aug. 2007.
    • (2007)
    • Brodsky, M.1
  • 4
    • 84877700103 scopus 로고    scopus 로고
    • SIF: Enforcing confidentiality and integrity in web applications
    • Aug
    • S. Chong, K. Vikram, and A. C. Myers. SIF: Enforcing confidentiality and integrity in web applications. In Proc. 16th USENIX Security, Aug. 2007.
    • (2007) Proc. 16th USENIX Security
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 5
    • 47149094631 scopus 로고    scopus 로고
    • StackGuard: Automatic detection and prevention of buffer-overflow attacks
    • Aug
    • C. Cowan et al. StackGuard: Automatic detection and prevention of buffer-overflow attacks. In Proc. 11th USENIX Security, Aug. 2002.
    • (2002) Proc. 11th USENIX Security
    • Cowan, C.1
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 7
    • 11844249640 scopus 로고    scopus 로고
    • ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Dec
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proc. 2002 OSDI, Dec. 2002.
    • (2002) Proc. 2002 OSDI
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 8
    • 37049021655 scopus 로고    scopus 로고
    • Labels and event processes in the Asbestos operating system
    • October
    • P. Efstathopoulos et al. Labels and event processes in the Asbestos operating system. In Proc. 20th SOSP, October 2005.
    • (2005) Proc. 20th SOSP
    • Efstathopoulos, P.1
  • 9
    • 85019186515 scopus 로고    scopus 로고
    • FastCGI
    • FastCGI. Open Market. http://www.fastcgi.com.
    • Open Market
  • 10
    • 0033690785 scopus 로고    scopus 로고
    • LOMAC: Low water-mark integrity protection for COTS environments
    • May
    • T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. In Proc. 2000 IEEE Security and Privacy, May 2000.
    • (2000) Proc. 2000 IEEE Security and Privacy
    • Fraser, T.1
  • 12
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A delegating architecture for secure system call interposition
    • February
    • T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Proc. 2004 NDSS, February 2004.
    • (2004) Proc. 2004 NDSS
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 14
    • 0015769027 scopus 로고
    • Architecture of virtual machines
    • R. Goldberg. Architecture of virtual machines. In 1973 NCC AFIPS Conf. Proc., volume 42, pages 309-318, 1973.
    • (1973) 1973 NCC AFIPS Conf. Proc , vol.42 , pp. 309-318
    • Goldberg, R.1
  • 15
    • 47149083633 scopus 로고    scopus 로고
    • Understanding practical application development in security-typed languages
    • December
    • B. Hicks, K. Ahmadizadeh, and P. McDaniel. Understanding practical application development in security-typed languages. In Proc. 22st ACSAC, December 2006.
    • (2006) Proc. 22st ACSAC
    • Hicks, B.1    Ahmadizadeh, K.2    McDaniel, P.3
  • 16
    • 0037493434 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • Dec
    • M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Proc. 14th SOSP, Dec. 1993.
    • (1993) Proc. 14th SOSP
    • Jones, M.B.1
  • 17
    • 12344333072 scopus 로고    scopus 로고
    • Jails: Confining the omnipotent root
    • May
    • P.-H. Kamp and R. N. M. Watson. Jails: Confining the omnipotent root. In Proc. 2nd SANE, May 2000.
    • (2000) Proc. 2nd SANE
    • Kamp, P.-H.1    Watson, R.N.M.2
  • 20
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • June, FREENIX track
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. 2001 USENIX, June 2001. FREENIX track.
    • (2001) Proc. 2001 USENIX
    • Loscocco, P.1    Smalley, S.2
  • 22
    • 47149088050 scopus 로고    scopus 로고
    • Dec. 2006
    • MoinMoin. The MoinMoin Wiki Engine, Dec. 2006. http://moinmoin. wikiwikiweb.de/.
    • The MoinMoin Wiki Engine
  • 23
    • 0002934582 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • Oct
    • A. C. Myers and B. Liskov. A decentralized model for information flow control. In Proc. 16th SOSP, Oct. 1997.
    • (1997) Proc. 16th SOSP
    • Myers, A.C.1    Liskov, B.2
  • 24
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • October
    • A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Computer Systems, 9(4):410-442, October 2000.
    • (2000) ACM Transactions on Computer Systems , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 25
    • 84869671511 scopus 로고    scopus 로고
    • National Vulnerability Database
    • National Vulnerability Database. CVE-2007-2637. http://nvd.nist.gov/nvd. cfm?cvename=CVE-2007-2637.
    • , vol.CVE-2007-2637
  • 26
    • 70449734226 scopus 로고    scopus 로고
    • osvdb.org. Open Source Vulnerability Database. http://osvdb.org/searchdb. php?base=moinmoin.
    • osvdb.org. Open Source Vulnerability Database. http://osvdb.org/searchdb. php?base=moinmoin.
  • 27
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Aug
    • N. Provos. Improving host security with system call policies. In Proc. 12th USENIX Security, Aug. 2003.
    • (2003) Proc. 12th USENIX Security
    • Provos, N.1
  • 28
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 32
    • 85069458084 scopus 로고    scopus 로고
    • Splitting Interfaces: Making trust between applications and operating systems configurable
    • Nov
    • R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making trust between applications and operating systems configurable. In Proc. 2006 OSDI, Nov. 2006.
    • (2006) Proc. 2006 OSDI
    • Ta-Min, R.1    Litty, L.2    Lie, D.3
  • 34
    • 33845440496 scopus 로고    scopus 로고
    • The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
    • June
    • R. Watson, W. Morrison, C. Vance, and B. Feldman. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. In Proc. 2003 USENIX, June 2003.
    • (2003) Proc. 2003 USENIX
    • Watson, R.1    Morrison, W.2    Vance, C.3    Feldman, B.4
  • 35
    • 1642406477 scopus 로고    scopus 로고
    • Scale and performance in the Denali isolation kernel
    • Dec
    • A. Whitaker, M. Shaw, and S. D. Gribble. Scale and performance in the Denali isolation kernel. In Proc. 2002 OSDI, Dec. 2002.
    • (2002) Proc. 2002 OSDI
    • Whitaker, A.1    Shaw, M.2    Gribble, S.D.3
  • 37
    • 84991934426 scopus 로고    scopus 로고
    • TightLip: Keeping applications from spilling the beans
    • Apr
    • A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In Proc. 2007 NSDI, Apr. 2007.
    • (2007) Proc. 2007 NSDI
    • Yumerefendi, A.R.1    Mickle, B.2    Cox, L.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.