메뉴 건너뛰기




Volumn , Issue , 2012, Pages 14-27

A software-hardware architecture for self-protecting data

Author keywords

Architecture; Information flow tracking; Self protecting data

Indexed keywords

CONFIDENTIAL INFORMATION; INFORMATION FLOWS; OUTPUT CONTROL; PLAINTEXT; RUNTIMES; SECURE DATA; SELF PROTECTING; SEMANTIC GAP; SENSITIVE DATAS; SOFTWARE POLICY; THIRD PARTY APPLICATION (APPS);

EID: 84869482676     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382201     Document Type: Conference Paper
Times cited : (56)

References (33)
  • 1
    • 78751515214 scopus 로고    scopus 로고
    • On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?
    • M. I. Al-Saleh and J. R. Crandall. On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible? In Proceedings of the Workshop on New Security Paradigms, pages 17-32, 2010.
    • (2010) Proceedings of the Workshop on New Security Paradigms , pp. 17-32
    • Al-Saleh, M.I.1    Crandall, J.R.2
  • 2
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of USENIX Security Symposium, pages 15:1-15:16, 2007.
    • (2007) Proceedings of USENIX Security Symposium , pp. 151-1516
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 14
    • 0025429331 scopus 로고
    • Improving direct-mapped cache performance by the addition of a small fully-associative cache and prefetch buffers
    • N. P. Jouppi. Improving direct-mapped cache performance by the addition of a small fully-associative cache and prefetch buffers. In Proceedings of the ACM/IEEE International Symposium on Computer Architecture, pages 364-373, 1990.
    • (1990) Proceedings of the ACM/IEEE International Symposium on Computer Architecture , pp. 364-373
    • Jouppi, N.P.1
  • 21
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • J. Park and R. Sandhu. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 23
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security. Selected Areas in Communications
    • Jan.
    • A. Sabelfeld and A. C. Myers. Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 21(1):5-19, Jan. 2003.
    • (2003) IEEE Journal on , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 28
    • 84870630391 scopus 로고    scopus 로고
    • Trusted Computing Group. Trusted Platform Module. https://www. trustedcomputinggroup.org/home.
    • Trusted Platform Module


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.