메뉴 건너뛰기




Volumn 6452 LNCS, Issue , 2010, Pages 334-354

Distributed middleware enforcement of event flow security policy

Author keywords

Event based middleware; Information flow control; Multi domain distributed applications; Security policy

Indexed keywords

APPLICATION DEVELOPERS; DATA CENTRIC; DISTRIBUTED APPLICATIONS; DISTRIBUTED MIDDLEWARE; DISTRIBUTED SOFTWARE; END-TO-END SECURITY; EVENT-BASED MIDDLEWARE; GLOBAL SECURITY; INFORMATION FLOW CONTROL; INTERACTION OF COMPONENTS; MULTI DOMAINS; MULTIPLE ORGANISATIONAL DOMAINS; SECURITY POLICY; SECURITY REQUIREMENTS; USER DATA; EVENT DRIVEN APPLICATIONS;

EID: 79956292393     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16955-7_17     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 3
    • 84888352157 scopus 로고    scopus 로고
    • Making information flow explicit in HiStar
    • Berkeley, CA, USA
    • Zeldovich, N., Kohler, E., et al.: Making information flow explicit in HiStar. In: OSDI 2006, Berkeley, CA, USA, pp. 263-278 (2006).
    • (2006) OSDI 2006 , pp. 263-278
    • Zeldovich, N.1    Kohler, E.2
  • 5
    • 84877700103 scopus 로고    scopus 로고
    • SIF: Enforcing confidentiality and integrity in web applications
    • Berkeley, CA
    • Chong, S., Vikram, K., Myers, A.: SIF: Enforcing confidentiality and integrity in web applications. In: USENIX Security Symposium, Berkeley, CA, pp. 1-16 (2007).
    • (2007) USENIX Security Symposium , pp. 1-16
    • Chong, S.1    Vikram, K.2    Myers, A.3
  • 9
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • Mǎŕik, V. ̌Sťeṕankov́a, O. Retschitzegger, W. (eds.), LNCS, Springer, Heidelberg
    • Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: Mǎŕik, V., ̌Sťeṕankov́a, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 377- 382. Springer, Heidelberg (2003).
    • (2003) DEXA 2003 , vol.2736 , pp. 377-382
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 10
    • 85013380871 scopus 로고    scopus 로고
    • Enforcing "sticky" security policies throughout a distributed application
    • ACM, New York
    • Chadwick, D.W., Lievens, S.F.: Enforcing "sticky" security policies throughout a distributed application. In: Middleware Security (MidSec), pp. 1-6. ACM, New York (2008).
    • (2008) Middleware Security (MidSec) , pp. 1-6
    • Chadwick, D.W.1    Lievens, S.F.2
  • 11
    • 57749192483 scopus 로고    scopus 로고
    • Information flow control for standard OS abstractions
    • ACM, New York
    • Krohn, M., Yip, A., Brodsky, M., et al.: Information flow control for standard OS abstractions. In: SOSP 2007, pp. 321-334. ACM, New York (2007).
    • (2007) SOSP 2007 , pp. 321-334
    • Krohn, M.1    Yip, A.2    Brodsky, M.3
  • 12
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • Berkeley, CA, USA
    • Zeldovich, N., Boyd-Wickizer, S., Mazìeres, D.: Securing distributed systems with information flow control. In: NSDI 2008, Berkeley, CA, USA, pp. 293-308 (2008).
    • (2008) NSDI 2008 , pp. 293-308
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazìeres, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.