메뉴 건너뛰기




Volumn , Issue , 2015, Pages 279-282

Information flow control for strong protection with flexible sharing in PaaS

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD PLATFORMS; CONTROLLED SHARING; DATA CENTRIC; FINE-GRAINED CONTROL; FLEXIBLE SHARING; INFORMATION FLOW CONTROL; SHARING MECHANISM; VIRTUAL MACHINES;

EID: 84944348355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IC2E.2015.64     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 34548029519 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors
    • S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based operating system virtualization: a scalable, highperformance alternative to hypervisors", in ACM SIGOPS Operating Systems Review, vol. 41, no. 3, 2007, pp. 275-287.
    • (2007) ACM SIGOPS Operating Systems Review , vol.41 , Issue.3 , pp. 275-287
    • Soltesz, S.1    Pötzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Bedford MA, Tech. Rep. M74-244, May
    • D. E. Bell and L. J. LaPadula, "Secure Computer Systems: Mathematical Foundations and Model", The MITRE Corp., Bedford MA, Tech. Rep. M74-244, May 1973.
    • (1973) The MITRE Corp.
    • Bell, D.E.1    La Padula, L.J.2
  • 6
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • K. J. Biba, "Integrity Considerations for Secure Computer Systems", MITRE Corp., Tech. Rep. ESD-TR 76-372, 1977.
    • (1977) MITRE Corp., Tech. Rep
    • Biba, K.J.1
  • 9
    • 84863165969 scopus 로고    scopus 로고
    • Kernel korner: Loadable kernel module programming and system call interception
    • Feb.
    • N. Dhanjani and G. Rodriguez-Rivera, "Kernel Korner: Loadable Kernel Module Programming and System Call Interception", Linux Journal, no. 82es, Feb. 2001.
    • (2001) Linux Journal , Issue.82
    • Dhanjani, N.1    Rodriguez-Rivera, G.2
  • 10
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • T. Garfinkel, "Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools." in NDSS, vol. 3, 2003, pp. 163-176.
    • (2003) NDSS , vol.3 , pp. 163-176
    • Garfinkel, T.1
  • 11
    • 85084162296 scopus 로고    scopus 로고
    • Exploiting concurrency vulnerabilities in system call wrappers
    • R. N. Watson, "Exploiting Concurrency Vulnerabilities in System Call Wrappers." WOOT, vol. 7, pp. 1-8, 2007.
    • (2007) WOOT , vol.7 , pp. 1-8
    • Watson, R.N.1
  • 16
    • 80053628507 scopus 로고    scopus 로고
    • From system-centric to datacentric logging-accountability, trust & Security in cloud computing
    • IEEE
    • R. K. Ko, M. Kirchberg, and B. S. Lee, "From System-centric to Datacentric Logging-accountability, Trust & Security in Cloud Computing", in Defense Science Research Conference and Expo (DSR), 2011. IEEE, 2011, pp. 1-4.
    • (2011) Defense Science Research Conference and Expo (DSR), 2011 , pp. 1-4
    • Ko, R.K.1    Kirchberg, M.2    Lee, B.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.