-
2
-
-
33646071594
-
On obligations
-
M. Hilty, D. Basin, and A. Pretschner, "On obligations," in Proc. ESORICS, 2005, pp. 98-117.
-
(2005)
Proc. ESORICS
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
3
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
4
-
-
38049040380
-
A policy language for distributed usage control
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, "A policy language for distributed usage control," in Proc. ESORICS, 2007, pp. 531-546.
-
(2007)
Proc. ESORICS
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
5
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
6
-
-
4344665550
-
Improving host security with system call policies
-
N. Provos, "Improving host security with system call policies," in Proc. SSYM, 2003, pp. 257-272.
-
(2003)
Proc. SSYM
, pp. 257-272
-
-
Provos, N.1
-
7
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
S. McCamant and M. D. Ernst, "Quantitative information flow as network flow capacity," in Proc. PLDI, 2008, pp. 193-205.
-
(2008)
Proc. PLDI
, pp. 193-205
-
-
McCamant, S.1
Ernst, M.D.2
-
8
-
-
0031543270
-
A decentralized model for information flow control
-
A. C. Myers and B. Liskov, "A decentralized model for information flow control," in Proc. SOSP, 1997, pp. 129-142.
-
(1997)
Proc. SOSP
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A lattice model of secure information flow," CACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
CACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris, "Labels and event processes in the asbestos operating system," in Proc. SOSP, 2005, pp. 17-30.
-
(2005)
Proc. SOSP
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
11
-
-
47149101814
-
Information flow control for standard os abstractions
-
M. N. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, "Information flow control for standard os abstractions," in SOSP, 2007, pp. 321-334.
-
(2007)
SOSP
, pp. 321-334
-
-
Krohn, M.N.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
12
-
-
39049086327
-
-
pp
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su, "Back to the future: A framework for automatic malware removal and system repair," pp. 257-268, 2006.
-
(2006)
Back to the future: A framework for automatic malware removal and system repair
, pp. 257-268
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
13
-
-
84904114872
-
Precip: Towards practical and retrofittable confidential information protection
-
X. Wang, Z. Li, N. Li, and J. Y. Choi, "Precip: Towards practical and retrofittable confidential information protection," in NDSS, 2008.
-
(2008)
NDSS
-
-
Wang, X.1
Li, Z.2
Li, N.3
Choi, J.Y.4
-
14
-
-
33947629208
-
Provenance-aware tracing of worm break-in and contaminations: A process coloring approach
-
X. Jiang, A. Walters, D. Xu, E. Spafford, F. Buchholz, and Y.-M. Wang, "Provenance-aware tracing of worm break-in and contaminations: A process coloring approach," in ICDCS, 2006, p. 38.
-
(2006)
ICDCS
, pp. 38
-
-
Jiang, X.1
Walters, A.2
Xu, D.3
Spafford, E.4
Buchholz, F.5
Wang, Y.-M.6
|