메뉴 건너뛰기




Volumn , Issue , 2011, Pages 347-362

Quire: Lightweight provenance for smart phone operating systems

Author keywords

[No Author keywords available]

Indexed keywords

IN NETWORKS; LOCAL RESOURCES; NETWORK CONNECTION; PAYMENT SYSTEMS; REMOTE SYSTEMS; SECURITY MECHANISM; SIGNATURE SCHEME; SMARTPHONE APPS;

EID: 85066347237     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (280)

References (39)
  • 7
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002.
    • (2002) ACM Transactions on Computer Systems (TOCS) , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 18
    • 0024089972 scopus 로고
    • The confused deputy
    • Oct.
    • N. Hardy. The confused deputy. ACM Operating Systems Review, 22(4):36-38, Oct. 1988.
    • (1988) ACM Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 21
    • 0006595839 scopus 로고
    • Message authentication with md5
    • B. Kaliski and M. Robshaw. Message authentication with md5. CryptoBytes, 1:5-8, 1995.
    • (1995) CryptoBytes , vol.1 , pp. 5-8
    • Kaliski, B.1    Robshaw, M.2
  • 25
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • A. C. Myers and B. Liskov. A decentralized model for information flow control. ACM SIGOPS Operating Systems Review, 31(5):129-142, 1997.
    • (1997) ACM SIGOPS Operating Systems Review , vol.31 , Issue.5 , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 31
    • 69149107997 scopus 로고    scopus 로고
    • Browser security: Lessons from Google Chrome
    • C. Reis, A. Barth, and C. Pizano. Browser security: Lessons from Google Chrome. Communications of the ACM, 52(8):45-49, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.8 , pp. 45-49
    • Reis, C.1    Barth, A.2    Pizano, C.3
  • 32
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept.
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 35
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • Oct.
    • D. S. Wallach, E. W. Felten, and A. W. Appel. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341-378, Oct. 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4 , pp. 341-378
    • Wallach, D.S.1    Felten, E.W.2    Appel, A.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.