메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 605-609

BIFI: Architectural support for information flow integrity measurement

Author keywords

Biba invoke integrity; Information flow; Trusted computing

Indexed keywords

ARCHITECTURAL SUPPORT; BIBA-INVOKE INTEGRITY; DISTRIBUTED APPLICATIONS; EXISTING SYSTEMS; INFORMATION FLOW SECURITY; INFORMATION FLOWS; INTEGRITY MEASUREMENT; KERNEL MODULES; MONOTONIC BEHAVIOR; OPERATING SYSTEMS; PROTECT INFORMATION; SECURITY REQUIREMENTS; SYSTEM SECURITY; TRUSTED COMPUTING; TRUSTED COMPUTING TECHNOLOGY;

EID: 79951540318     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSSE.2008.738     Document Type: Conference Paper
Times cited : (7)

References (14)
  • 1
    • 79951537753 scopus 로고    scopus 로고
    • TCG Specification Architecture Overview. http://www. trustedcomputinggroup.org, Revision 1.3, March 2007.
  • 2
    • 79951540815 scopus 로고    scopus 로고
    • National Security Agency. Security-Enhanced Linux(SELinux).http://www. nsa.gov/selinux, 2001.
  • 3
    • 0023266943 scopus 로고    scopus 로고
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, May 1987.
  • 4
    • 79951549016 scopus 로고    scopus 로고
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
  • 5
    • 79951522731 scopus 로고    scopus 로고
    • W. E. Boebert and R. Y. Kain. A Practical Alternative to Hierarchical Integrity Policies. In Proceedings of the 8th National Computer Security Conference, Gaithersburg, Maryland, 1985.
  • 6
    • 79951541140 scopus 로고    scopus 로고
    • J. Guttman, A. Herzog, and J. Ramsdell. Information flow in operating systems: Eager formal methods. In Workshop on Issues in the Theory of Security (WITS), 2003.
  • 7
    • 79951540651 scopus 로고    scopus 로고
    • Dieter Gollmann. Computer Security. John Wiley & Sons Press, London, 1999.
  • 8
    • 0033690785 scopus 로고    scopus 로고
    • Timothy Fraser. Lomac: Low water-mark integrity protection for cots environments. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 230, Washington, DC, USA, 2000. IEEE Computer Society.
  • 9
    • 84956968842 scopus 로고    scopus 로고
    • Sean W. Smith. Outbound authentication for programmable secure coprocessors. In ESORICS '02: Proceedings of the 7th European Symposium on Research in Computer Security, pages 72-89, London, UK, 2002. Springer-Verlag.
  • 10
    • 85084162270 scopus 로고    scopus 로고
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, pages 223 - 238, 2004.
  • 11
    • 79951545578 scopus 로고    scopus 로고
    • Umesh Shankar, Trent Jaeger, and Reiner Sailer. Toward automated information-flow integrity for security-critical applications. In Proceedings of the 13th Annual Network and Distributed Systems Security Symposium. Internet Society, 2006.
  • 12
    • 21644475650 scopus 로고    scopus 로고
    • Neil Vachharajani, Matthew J. Bridges, Jonathan Chang, Ram Rangan, Guilherme Ottoni, Jason A. Blome, George A. Reis, Manish Vachharajani, David I. August. RIFLE: An architectural framework for user-centric information-flow security. In Proceedings of the 37th International Symposium on Microarchitecture (MICRO), 2004.
  • 13
    • 33748062337 scopus 로고    scopus 로고
    • Trent Jaeger, Reiner Sailer, Umesh Shankar. PRIMA: policy-reduced integrity measurement architecture. In proceedings of the eleventh ACM symposium on Access control models and technologies SACMAT, 2006.
  • 14
    • 85017025817 scopus 로고    scopus 로고
    • Jedidiah R. Crandall and S. Felix Wu. Minos: Architectural Support for Protecting Control Data. ACM Transactions on Architecture and Code Optimization, Vol. 3, No. 4, Pages 359 - 389, December 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.