메뉴 건너뛰기




Volumn 54, Issue 11, 2011, Pages 93-101

Making information flow explicit in histar

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION FLOW CONTROL; INFORMATION FLOWS; NOVEL APPLICATIONS; PRIVACY PRESERVING; SECURITY FEATURES; VIRUS SCANNERS; WEB SERVERS;

EID: 80155195722     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/2018396.2018419     Document Type: Article
Times cited : (36)

References (21)
  • 5
    • 0033690785 scopus 로고    scopus 로고
    • LOMAC: Low water-mark integrity protection for COTS environments
    • Oakland, CA, May
    • Fraser, T. LOMAC: low water-mark integrity protection for COTS environments. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 2000), 230-245.
    • (2000) Proceedings of the IEEE Symposium on Security and Privacy , pp. 230-245
    • Fraser, T.1
  • 6
    • 85084161535 scopus 로고
    • The Spring nucleus: A microkernel for objects
    • Cincinnati, OH, April
    • Hamilton, G., Kougiouris, P. The Spring nucleus: a microkernel for objects. In Proceedings of the Summer 1993 USENIX (Cincinnati, OH, April 1993), 147-159.
    • (1993) Proceedings of the Summer 1993 USENIX , pp. 147-159
    • Hamilton, G.1    Kougiouris, P.2
  • 9
    • 0019608720 scopus 로고
    • Formal models for computer security
    • September
    • Landwehr, C. E. Formal models for computer security. Comput. Surv. 13, 3(September 1981), 247-278.
    • (1981) Comput. Surv , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 10
    • 80155212272 scopus 로고    scopus 로고
    • Anti-virus vulnerabilities strike again
    • March
    • Leyden, J. Anti-virus vulnerabilities strike again. The Register, March 2005. http://www.theregister. co.uk/2005/03/18/mcafee-vuln/
    • (2005) The Register
    • Leyden, J.1
  • 11
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the linux operating system
    • Boston, MA, June, FREENIX track
    • Loscocco, P., Smalley, S. Integrating flexible support for security policies into the linux operating system. In Proceedings of the 2001 USENIX (Boston, MA, June 2001), 29-40, FREENIX track.
    • (2001) Proceedings of the 2001 USENIX , pp. 29-40
    • Loscocco, P.1    Smalley, S.2
  • 13
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • October
    • Myers, A. C., Liskov, B. Protecting privacy using the decentralized label model. Trans. Comput. Syst. 9, 4(October 2000), 410-442.
    • (2000) Trans. Comput. Syst , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 14
    • 80155134880 scopus 로고    scopus 로고
    • Symantec antivirus worm hole puts millions at risk
    • May
    • Naraine, R. Symantec antivirus worm hole puts millions at risk. eWeek.com, May 2006. http://www.eweek. com/article2/0, 1895, 1967941, 00.asp
    • (2006) EWeek.com
    • Naraine, R.1
  • 15
    • 80155176060 scopus 로고    scopus 로고
    • Anti-virus rife with vulnerabilities
    • January
    • Peterson, D. Anti-virus rife with vulnerabilities. digitalbond.com, January 2008. http://www.digitalbond.com/index.php/2008/01/07/anti-virus-rife- with-vulnerabilities/
    • (2008) Digitalbond.com
    • Peterson, D.1
  • 16
    • 80155199329 scopus 로고
    • A hardware architecture for implementing protection rings
    • New York, March
    • Schroeder, M. D., Saltzer, J. H. A hardware architecture for implementing protection rings. In Proceedings of the 3rd SOSP (New York, March 1972), 42-54.
    • (1972) Proceedings of the 3rd SOSP , pp. 42-54
    • Schroeder, M.D.1    Saltzer, J.H.2
  • 19
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • San Francisco, CA, April
    • Zeldovich, N., Boyd-Wickizer, S., Mazières, D. Securing distributed systems with information flow control. In Proceedings of the 5th NSDI (San Francisco, CA, April 2008), 293-308.
    • (2008) Proceedings of the 5th NSDI , pp. 293-308
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazières, D.3
  • 20
    • 77952337533 scopus 로고    scopus 로고
    • Hardware enforcement of application security policies
    • San Diego, CA, December
    • Zeldovich, N., Kannan, H., Dalton, M., Kozyrakis, C. Hardware enforcement of application security policies. In Proceedings of the 8th OSDI (San Diego, CA, December 2008), 225-240.
    • (2008) Proceedings of the 8th OSDI , pp. 225-240
    • Zeldovich, N.1    Kannan, H.2    Dalton, M.3    Kozyrakis, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.