메뉴 건너뛰기




Volumn , Issue , 2009, Pages 91-96

Information-flow aware virtual machines: Foundations for trustworthy computing

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; INFORMATION FLOWS; RUNTIME; SOFTWARE SYSTEMS; TRUSTED COMPUTING BASIS; TRUSTWORTHY COMPUTING; VIRTUAL MACHINES;

EID: 66249098852     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CATCH.2009.45     Document Type: Conference Paper
Times cited : (1)

References (29)
  • 5
    • 66149192894 scopus 로고
    • Secure computer systems: Mathematical foundations
    • November
    • D. Bell and L. LaPadula. Secure computer systems: mathematical foundations. Report MTR 2547 v2, MITRE, November 1973.
    • (1973) Report MTR 2547 v2, MITRE
    • Bell, D.1    Padula, L.L.2
  • 8
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a Java virtual machine
    • December, IEEE Computer Society Publications
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In 23rd Annual Computer Security Applications Conference (ACSAC 2007), pages 463-474. IEEE Computer Society Publications, December 2007.
    • (2007) 23rd Annual Computer Security Applications Conference (ACSAC 2007) , pp. 463-474
    • Chandra, D.1    Franz, M.2
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 0033489650 scopus 로고    scopus 로고
    • SASI Enforcement of security policies: A retrospective
    • Ontario, Canada, 22-24, ACM SIGSAC, ACM Press
    • U. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
    • (1999) New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 12
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • DOI 10.1109/52.976940
    • D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002. (Pubitemid 34069369)
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 15
    • 34547981855 scopus 로고    scopus 로고
    • Containing the ultimate trojan horse
    • DOI 10.1109/MSP.2007.77
    • M. Franz. Containing the ultimate Trojan Horse. IEEE Security and Privacy, 5(4):64-68, July 2007. (Pubitemid 47274800)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.4 , pp. 52-56
    • Franz, M.1
  • 16
    • 66249138690 scopus 로고    scopus 로고
    • Eliminating trust from application programs by way of software architecture
    • February, number 121 in Lecture Notes in Informatics
    • M. Franz. Eliminating trust from application programs by way of software architecture. In Proceedings of Software Engineering 2008 (SE 2008), number 121 in Lecture Notes in Informatics, pages 112-126, February 2008.
    • (2008) Proceedings of Software Engineering 2008 (SE 2008) , pp. 112-126
    • Franz, M.1
  • 17
    • 33846310068 scopus 로고    scopus 로고
    • Dynamic taint propagation for Java
    • DOI 10.1109/CSAC.2005.21, 1565257, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
    • V. Haldar, D. Chandra, and M. Franz. Dynamic taint propagation for Java. In Twenty-First Annual Computer Security Applications Conference (ACSAC 2005), pages 274- 282. IEEE Computer Society Publications, December 2005. (Pubitemid 46116486)
    • (2005) Proceedings - Annual Computer Security Applications Conference, ACSAC , vol.2005 , pp. 303-311
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 22
    • 0000046942 scopus 로고
    • A security flow control algorithm and its denotational semantics correctness proof
    • A
    • M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
    • (1992) Formal Aspects of Computing , vol.4 , Issue.6 , pp. 727-754
    • Mizuno, M.1    Schmidt, D.A.2
  • 25
    • 48649105822 scopus 로고
    • Secure multilevel virtual computer systems
    • Bedford, Massachussetts
    • R. Rhode. Secure multilevel virtual computer systems. Technical Report ESD-TR-74-370, MITRE Corp., Bedford, Massachussetts, 1975.
    • (1975) Technical Report ESD-TR-74-370, MITRE Corp
    • Rhode, R.1
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.