Assuring Distributed Trusted Mach
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Confining root programs with domain and type enforcement (DTE)
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Providing policy control over object operations in a mach based system
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Domain and type enforcement for linux
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4
Improving the granularity of access control for Windows 2000
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
TrustedBSD: Adding Trusted Operating System Features to FreeBSD
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Planned Extensions to the Linux Ext2/Ext3 Filesystem
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference
Linux Security Modules: General Security Support for the Linux Kernel
Proceedings of the 11th USENIX Security Symposium
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Countering code-injection attacks with instruction-set randomization
Proceedings of the 10th ACM conference on Computer and communications security
Root Kits: an operating systems viewpoint
ACM SIGOPS Operating Systems Review
Towards a formal model for security policies specification and validation in the selinux system
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the 2004 Asia and South Pacific Design Automation Conference
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Verifying information flow goals in security-enhanced Linux
Journal of Computer Security - Special issue on WITS'03
A policy flexible architecture for secure operating system
ACM SIGOPS Operating Systems Review
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
SVGrid: a secure virtual environment for untrusted grid applications
MGC '05 Proceedings of the 3rd international workshop on Middleware for grid computing
Automatic placement of authorization hooks in the linux security modules framework
Proceedings of the 12th ACM conference on Computer and communications security
Privileged operations in the PlanetLab virtualised environment
ACM SIGOPS Operating Systems Review
Using VMM-based sensors to monitor honeypots
Proceedings of the 2nd international conference on Virtual execution environments
Secure and High-Performance Web Server System for Shared Hosting Service
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Supporting access control policies across multiple operating systems
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Minos: Architectural support for protecting control data
ACM Transactions on Architecture and Code Optimization (TACO)
SecureBus: towards application-transparent trusted computing with mandatory access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A new distributed security model for Linux Clusters
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Copilot - a coprocessor-based kernel runtime integrity monitor
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Performance aware secure code partitioning
Proceedings of the conference on Design, automation and test in Europe
Towards a VMM-based usage control framework for OS kernel integrity protection
Proceedings of the 12th ACM symposium on Access control models and technologies
Chinese-wall process confinement for practical distributed coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Information flow control for standard OS abstractions
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Making information flow explicit in HiStar
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Splitting interfaces: making trust between applications and operating systems configurable
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Daonity - Grid security from two levels of virtualization
Information Security Tech. Report
Labels and event processes in the Asbestos operating system
ACM Transactions on Computer Systems (TOCS)
A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Linux kernel integrity measurement using contextual inspection
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Xcellog: A deductive spreadsheet system
The Knowledge Engineering Review
Secure isolation of untrusted legacy applications
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Application-level isolation and recovery with solitude
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Manageable fine-grained information flow
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
SIF: enforcing confidentiality and integrity in web applications
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A simple implementation and performance evaluation extended-role based access control
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
Processor virtualization for secure mobile terminals
ACM Transactions on Design Automation of Electronic Systems (TODAES)
A practical mimicry attack against powerful system-call monitors
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Visualization based policy analysis: case study in SELinux
Proceedings of the 13th ACM symposium on Access control models and technologies
PULSE: a pluggable user-space Linux security environment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Wedge: splitting applications into reduced-privilege compartments
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Virtual servers and checkpoint/restart in mainstream Linux
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
Secure Sharing of an ICT Infrastructure through Vinci
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Expanding Malware Defense by Securing Software Installations
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Proceedings of the 15th ACM conference on Computer and communications security
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 2008 workshop on Middleware security
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
Dynamic security domain scaling on embedded symmetric multiprocessors
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Expressive policy analysis with enhanced system dynamicity
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Trojan horse resistant discretionary access control
Proceedings of the 14th ACM symposium on Access control models and technologies
Laminar: practical fine-grained decentralized information flow control
Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation
SAConf: Semantic Attestation of Software Configurations
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Towards System Integrity Protection with Graph-Based Policy Analysis
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
International Journal of Networking and Virtual Organisations
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Enforcement of integrated security policy in trusted operating systems
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Fine-grained sticky provenance architecture for office documents
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An OS security protection model for defeating attacks from network
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Proceedings of the 13th international conference on Security protocols
Lothlorien: mandatory access control using linux security modules
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
ProActive caching: a framework for performance optimized access control evaluations
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
A low-cost runtime-privilege changing system for shared servers
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Analysis of privacy and security policies
IBM Journal of Research and Development
Proceedings of the 3rd international conference on Security of information and networks
SEEdit: SELinux security policy configuration system with higher level language
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Apiary: easy-to-use desktop application fault containment on commodity operating systems
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Retaining sandbox containment despite bugs in privileged memory-safe code
Proceedings of the 17th ACM conference on Computer and communications security
A control point for reducing root abuse of file-system privileges
Proceedings of the 17th ACM conference on Computer and communications security
AccessMiner: using system-centric models for malware protection
Proceedings of the 17th ACM conference on Computer and communications security
Using hypervisors to secure commodity operating systems
Proceedings of the fifth ACM workshop on Scalable trusted computing
Hardware-assisted security enhanced Linux in embedded systems: a proposal
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Exploitation and threat analysis of open mobile devices
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Intrusion recovery using selective re-execution
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Making Linux protection mechanisms egalitarian with UserFS
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Capsicum: practical capabilities for UNIX
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Structuring protocol implementations to protect sensitive data
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the first ACM conference on Data and application security and privacy
SEIP: simple and efficient integrity protection for open mobile platforms
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Rethinking the library OS from the top down
Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems
Designing and Implementing the OP and OP2 Web Browsers
ACM Transactions on the Web (TWEB)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Applying a usage control model in an operating system kernel
Journal of Network and Computer Applications
Making information flow explicit in HiStar
Communications of the ACM
Towards a trustworthy, lightweight cloud computing framework for embedded systems
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Breaking up is hard to do: security and functionality in a commodity hypervisor
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems
ACM Transactions on Information and System Security (TISSEC)
Unicorn: two-factor attestation for data security
Proceedings of the 18th ACM conference on Computer and communications security
Design and implementation of fast access control that supports the separation of duty
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Protection of components based on a smart-card enhanced security module
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Towards job accounting in existing resource schedulers: weaknesses and improvements
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A taste of Capsicum: practical capabilities for UNIX
Communications of the ACM
Using labeling to prevent cross-service attacks against smart phones
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Mobile resource guarantees and policies
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Enhancing accountability of electronic health record usage via patient-centric monitoring
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Deductive spreadsheets using tabled logic programming
ICLP'06 Proceedings of the 22nd international conference on Logic Programming
Design and implementation of an extended reference monitor for trusted operating systems
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A security architecture for adapting multiple access control models to operating systems
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Identifying native applications with high assurance
Proceedings of the second ACM conference on Data and Application Security and Privacy
Name-Level approach for egress network access control
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
SMARTCOP – a smart card based access control for the protection of network security components
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Information flow query and verification for security policy of security-enhanced linux
IWSEC'06 Proceedings of the 1st international conference on Security
Managing critical infrastructures through virtual network communities
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Research on multistage interconnection architecture and collision detection model
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Towards access control model engineering
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Integration of a cryptographic file system and access control
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Hypervisor-based protection of sensitive files in a compromised system
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Advanced MAC in HPC Systems: Performance Improvement
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
kGuard: lightweight kernel protection against return-to-user attacks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
CloudFilter: practical control of sensitive data propagation to the cloud
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Situation-based policy enforcement
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Improving Mandatory Access Control for HPC clusters
Future Generation Computer Systems
A decade of OS access-control extensibility
Communications of the ACM
A Decade of OS Access-control Extensibility
Queue - Web Development
Heuristic safety analysis of access control models
Proceedings of the 18th ACM symposium on Access control models and technologies
Least-restrictive enforcement of the Chinese wall security policy
Proceedings of the 18th ACM symposium on Access control models and technologies
Mandatory access control with a multi-level reference monitor: PIGA-cluster
Proceedings of the first workshop on Changing landscapes in HPC security
Content-based isolation: rethinking isolation policy design on client systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
MinimaLT: minimal-latency networking through better security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A portable user-level approach for system-wide integrity protection
Proceedings of the 29th Annual Computer Security Applications Conference
SEC'13 Proceedings of the 22nd USENIX conference on Security
The Journal of Supercomputing
Hi-index | 0.05 |