메뉴 건너뛰기




Volumn , Issue , 2009, Pages 373-380

State-based usage control enforcement with data flow tracking using system call interposition

Author keywords

[No Author keywords available]

Indexed keywords

DATA FLOW; DATA PROTECTION; DATAFLOW MODEL; MAIN MEMORY; NETWORK SOCKETS; PERFORMANCE MEASUREMENTS; POLICY ENFORCEMENT; SENSITIVE DATAS; STATE-BASED; SYSTEM CALL INTERPOSITION; SYSTEM CALLS; USAGE CONTROL;

EID: 72849109064     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.51     Document Type: Conference Paper
Times cited : (49)

References (14)
  • 3
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 5
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 6
    • 4344665550 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • N. Provos, "Improving host security with system call policies," in Proc. SSYM, 2003, pp. 257-272.
    • (2003) Proc. SSYM , pp. 257-272
    • Provos, N.1
  • 7
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative information flow as network flow capacity
    • S. McCamant and M. D. Ernst, "Quantitative information flow as network flow capacity," in Proc. PLDI, 2008, pp. 193-205.
    • (2008) Proc. PLDI , pp. 193-205
    • McCamant, S.1    Ernst, M.D.2
  • 8
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • A. C. Myers and B. Liskov, "A decentralized model for information flow control," in Proc. SOSP, 1997, pp. 129-142.
    • (1997) Proc. SOSP , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A lattice model of secure information flow," CACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) CACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 13
    • 84904114872 scopus 로고    scopus 로고
    • Precip: Towards practical and retrofittable confidential information protection
    • X. Wang, Z. Li, N. Li, and J. Y. Choi, "Precip: Towards practical and retrofittable confidential information protection," in NDSS, 2008.
    • (2008) NDSS
    • Wang, X.1    Li, Z.2    Li, N.3    Choi, J.Y.4
  • 14
    • 33947629208 scopus 로고    scopus 로고
    • Provenance-aware tracing of worm break-in and contaminations: A process coloring approach
    • X. Jiang, A. Walters, D. Xu, E. Spafford, F. Buchholz, and Y.-M. Wang, "Provenance-aware tracing of worm break-in and contaminations: A process coloring approach," in ICDCS, 2006, p. 38.
    • (2006) ICDCS , pp. 38
    • Jiang, X.1    Walters, A.2    Xu, D.3    Spafford, E.4    Buchholz, F.5    Wang, Y.-M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.