-
2
-
-
33845414042
-
Labels and event processes in the asbestos operating system
-
DOI 10.1145/1095809.1095813
-
Efstathopoulos, P., Krohn, M., VanDeBogart, S., et al.: Labels and event processes in the Asbestos Operating System. In: SOSP 2005, pp. 17-30. ACM, New York (2005). (Pubitemid 44892202)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazieres, D.7
Kaashoek, F.8
Morris, R.9
-
3
-
-
84888352157
-
Making information flow explicit in HiStar
-
Berkeley, CA, USA
-
Zeldovich, N., Kohler, E., et al.: Making information flow explicit in HiStar. In: OSDI 2006, Berkeley, CA, USA, pp. 263-278 (2006).
-
(2006)
OSDI 2006
, pp. 263-278
-
-
Zeldovich, N.1
Kohler, E.2
-
5
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
Berkeley, CA
-
Chong, S., Vikram, K., Myers, A.: SIF: Enforcing confidentiality and integrity in web applications. In: USENIX Security Symposium, Berkeley, CA, pp. 1-16 (2007).
-
(2007)
USENIX Security Symposium
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.3
-
6
-
-
79956336361
-
Enforcing user privacy in web applications using Erlang
-
Oakland, CA, USA, IEEE, Los Alamitos
-
Papagiannis, I., Migliavacca, M., Eyers, D.M., Shand, B., Bacon, J., Pietzuch, P.: Enforcing user privacy in web applications using Erlang. In: Web 2.0 Security and Privacy (W2SP), Oakland, CA, USA. IEEE, Los Alamitos (2010).
-
(2010)
Web 2.0 Security and Privacy (W2SP)
-
-
Papagiannis, I.1
Migliavacca, M.2
Eyers, D.M.3
Shand, B.4
Bacon, J.5
Pietzuch, P.6
-
7
-
-
79951908511
-
High-performance event processing with information security
-
Boston, MA, USA
-
Miglivacca, M., Papagiannis, I., Eyers, D., Shand, B., Bacon, J., Pietzuch, P.: High-performance event processing with information security. In: USENIX Annual Technical Conference, Boston, MA, USA, pp. 1-15 (2010).
-
(2010)
USENIX Annual Technical Conference
, pp. 1-15
-
-
Miglivacca, M.1
Papagiannis, I.2
Eyers, D.3
Shand, B.4
Bacon, J.5
Pietzuch, P.6
-
8
-
-
33845242072
-
Using argumentation logic for firewall policy specification and analysis
-
Large Scale Management of Distributed Systems - 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Proceedings
-
Bandara, A., Kakas, A., Lupu, E., Russo, A.: Using argumentation logic for firewall policy specification and analysis. In: Distributed Systems: Operations and Management (DSOM), Dublin, Ireland, pp. 185-196 (2006). (Pubitemid 44860490)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4269
, pp. 185-196
-
-
Bandara, A.K.1
Kakas, A.2
Lupu, E.C.3
Russo, A.4
-
9
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
Mǎŕik, V. ̌Sťeṕankov́a, O. Retschitzegger, W. (eds.), LNCS, Springer, Heidelberg
-
Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: Mǎŕik, V., ̌Sťeṕankov́a, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 377- 382. Springer, Heidelberg (2003).
-
(2003)
DEXA 2003
, vol.2736
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
10
-
-
85013380871
-
Enforcing "sticky" security policies throughout a distributed application
-
ACM, New York
-
Chadwick, D.W., Lievens, S.F.: Enforcing "sticky" security policies throughout a distributed application. In: Middleware Security (MidSec), pp. 1-6. ACM, New York (2008).
-
(2008)
Middleware Security (MidSec)
, pp. 1-6
-
-
Chadwick, D.W.1
Lievens, S.F.2
-
11
-
-
57749192483
-
Information flow control for standard OS abstractions
-
ACM, New York
-
Krohn, M., Yip, A., Brodsky, M., et al.: Information flow control for standard OS abstractions. In: SOSP 2007, pp. 321-334. ACM, New York (2007).
-
(2007)
SOSP 2007
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
-
12
-
-
85094632142
-
Securing distributed systems with information flow control
-
Berkeley, CA, USA
-
Zeldovich, N., Boyd-Wickizer, S., Mazìeres, D.: Securing distributed systems with information flow control. In: NSDI 2008, Berkeley, CA, USA, pp. 293-308 (2008).
-
(2008)
NSDI 2008
, pp. 293-308
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazìeres, D.3
|