Filters








74,576 Hits in 7.0 sec

Aspectizing JavaScript security

Florent Marchand de Kerchove, Jacques Noyé, Mario Südholt
<span title="">2013</span> <i title="ACM Press"> Proceedings of the 3rd workshop on Modularity in systems software - MISS &#39;13 </i> &nbsp;
In this position paper we argue that aspects are wellsuited to describe and implement a range of strategies to make secure JavaScript-based applications.  ...  To this end, we review major categories of approaches to make client-side applications secure and discuss uses of aspects that exist for some of them.  ...  The authors would also like to thank the reviewers for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2451613.2451616">doi:10.1145/2451613.2451616</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7yrvqlusmjbcli5qjuffdngeqy">fatcat:7yrvqlusmjbcli5qjuffdngeqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922235848/http://web.emn.fr/x-info/sudholt/papers/miss13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/d5/00d5ce7b50ef003f56834a88086fde65062870ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2451613.2451616"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Mining Secure Behavior of Hardware Designs [article]

Calvin Deutschbein
<span title="2021-08-20">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
For information--flow hyperproperties, I demonstrate that a miner may use Information Flow Tracking (IFT) to develop output properties containing designer specified information--flow security properties  ...  On CISC architectures such as x86, I demonstrate that a miner partitioning the design state space along control signals discovers a specification that includes manually defined properties and, if followed  ...  Further, as an access control module, by nature much of its functionality was relevant to secure access control.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.09249v1">arXiv:2108.09249v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hldkifb4qvas7dt7hsybgphooy">fatcat:hldkifb4qvas7dt7hsybgphooy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210901131946/https://arxiv.org/pdf/2108.09249v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/47/f04719ae0819f6c29e49a541ab49356a56345d3a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.09249v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Framework and Assessment of Information Security in the Product Design Centre: A Quantifiable Analysis on Information Flow

<span title="2019-10-30">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h673cvfolnhl3mnbjxkhtxdtg4" style="color: black;">International Journal of Engineering and Advanced Technology</a> </i> &nbsp;
To support the feasibility of this approach and solicitation of these devices to true situations, for instance uncovered a few perilous states in a plan focus data framework approach and distinguished  ...  A layered compositional model for the data security of the inside is considered to beat the dangers.  ...  Rewriting access control matrices Information flow graphs IFG = (V, E).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.a1043.109119">doi:10.35940/ijeat.a1043.109119</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ugmdeapmofgc3db7zjaosgzwve">fatcat:ugmdeapmofgc3db7zjaosgzwve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200209050459/https://www.ijeat.org/wp-content/uploads/papers/v9i1/A1043109119.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/85/6d8512e26fe04da85a0216c6058e611315e9a608.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.a1043.109119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

PCPP: Private Computing on Public Platforms A New Paradigm in Public Computing

Thomas Morris, V.S.S. Nair
<span title="">2007</span> <i title="IEEE"> 2007 2nd International Symposium on Wireless Pervasive Computing </i> &nbsp;
To that end, we propose PCPP as a new paradigm in public computing in which the remote host is not trusted, rather, security is owned and enforced by the application.  ...  Index Terms-computer security, mobile code security, privacy 1-4244-0523-8/07/$20.00  ...  Since mobile agents can carry their execution state from host to host, they may be signed by every host on which they execute.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iswpc.2007.342606">doi:10.1109/iswpc.2007.342606</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pjmtttba5febrnlvqamx7vpzfi">fatcat:pjmtttba5febrnlvqamx7vpzfi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150105183529/http://www.ece.msstate.edu:80/~morris/iswpc07_morris.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/1a/071ad92c371d374c537e697224231e2140c276ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iswpc.2007.342606"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Methodology For Creating Information Flow Specifications of Hardware Designs [article]

Calvin Deutschbein, Andres Meza, Francesco Restuccia, Ryan Kastner, Cynthia Sturton
<span title="2021-06-14">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We demonstrate Isadora may define the information flows within an access control module in isolation and within an SoC and over a RISC-V design.  ...  Over the access control module, Isadora mined output completely covers an assertion based security specification of the design provided by the designers.  ...  The Access Control Module (ACM) wraps any AXI controller to implement access control by checking the validity of read and write requests and rejecting those violating a configured access control policy  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.07449v1">arXiv:2106.07449v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tthuari24rbezgoukkh6kx7ase">fatcat:tthuari24rbezgoukkh6kx7ase</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210616042230/https://arxiv.org/pdf/2106.07449v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d2/28/d228bb17685e862519599f07591c428dd77e6801.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.07449v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Policy-Driven Memory Protection for Reconfigurable Hardware [chapter]

Ted Huffmire, Shreyas Prasad, Tim Sherwood, Ryan Kastner
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The efficiency of our access language design flow is evaluated in terms of area and cycle time across a variety of security scenarios.  ...  Our approach includes a specialized compiler that translates a policy of legal sharing to reconfigurable logic blocks which can be directly transferred to an FPGA.  ...  The Trigger event causes the state machine to transition from State 1 to State 0, and the Clear event causes the machine to transition from State 0 to State 1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11863908_28">doi:10.1007/11863908_28</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ruhyhl25bb5rddk5c3fap6zai">fatcat:4ruhyhl25bb5rddk5c3fap6zai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061205232225/http://engineering.ucsb.edu:80/~sherwood/pubs/ESORICS-hwmon.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/40/fc40f5c4994ca3ed7d30f6e1d6522192993cb3dc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11863908_28"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

ECOS

Aaron Gember, Christopher Dragga, Aditya Akella
<span title="">2012</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hqinhq4hgzfvfj7i5ayjeliple" style="color: black;">Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS &#39;12</a> </i> &nbsp;
security constraints.  ...  ECOS functions as an application running at an enterprise-wide controller to allocate resources to mobile applications based on privacy and performance requirements, to ensure fairness, and to enforce  ...  ACKNOWLEDGEMENTS We would like to thank our shepherd Ripduman Sohan and the anonymous reviewers for their insightful feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2396556.2396598">doi:10.1145/2396556.2396598</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ancs/GemberDA12.html">dblp:conf/ancs/GemberDA12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4edqkscgmjhnlnnbcybxrhu56a">fatcat:4edqkscgmjhnlnnbcybxrhu56a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160325184630/http://pages.cs.wisc.edu/~akella/papers/ecos.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/6f/926f828b38f49cac50486af53206864de2ef34ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2396556.2396598"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Security Rules versus Security Properties [chapter]

Mathieu Jaume
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We also show how a policy can be applied to constrain an existing system, and how a secure system can be defined from a security policy.  ...  There exist many approaches to specify and to define security policies.  ...  This is the case for some policies aiming to control the order of actions. Property-based policies versus Rule-based policies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17714-9_17">doi:10.1007/978-3-642-17714-9_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zgy3ugpmu5dejgcbfv3l75in7a">fatcat:zgy3ugpmu5dejgcbfv3l75in7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20111214202706/http://hal.archives-ouvertes.fr/docs/00/59/39/37/PDF/jaume.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/e7/55e74dee86461fce982597a9d154e08a610522f0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17714-9_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Relational Models of Microarchitectures for Formal Security Analyses [article]

Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel
<span title="2021-12-20">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our core contribution is an axiomatic vocabulary for formally defining LCMs, derived from the established axiomatic vocabulary used to formalize processor memory consistency models.  ...  There is a growing need for hardware-software contracts which precisely define the implications of microarchitecture on software security-i.e., security contracts.  ...  ACKNOWLEDGEMENTS We would like to thank John Mitchell and Clark Barrett for their valuable discussions and feedback on this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.10511v1">arXiv:2112.10511v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ylcaex3mxfatrl2sezl5hl2iha">fatcat:ylcaex3mxfatrl2sezl5hl2iha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211231155903/https://arxiv.org/pdf/2112.10511v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/b4/87b45ecde6b0984fb23a0a6a1965f2358115c2cf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.10511v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Rule-Based Run-Time Information Flow Control in Service Cloud

Wei She, I-Ling Yen, Bhavani Thuraisingham, San-Yih Huang
<span title="">2011</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v5fagqotxjcn3jsjkqi336dzse" style="color: black;">2011 IEEE International Conference on Web Services</a> </i> &nbsp;
To achieve fine-grained information flow control, it is also necessary to analyze the flow and processing of the data and derive the dependencies between the data dynamically generated or used in a service  ...  In this paper, we develop a run-time information flow control model for service cloud.  ...  Another issue that needs to be considered in service access control models is action based versus resource based access control.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icws.2011.35">doi:10.1109/icws.2011.35</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icws/SheYTH11.html">dblp:conf/icws/SheYTH11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xilz3oauyzhtpaezvtupf5mpdi">fatcat:xilz3oauyzhtpaezvtupf5mpdi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809085141/http://www.utdallas.edu/~bxt043000/Publications/Conference-Papers/RTP/C155_Rule-based%20Run-time%20Information%20Flow%20Control%20in%20Service%20Cloud.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/ef/62efba1b80694a6294a77922b18330b8950c6610.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icws.2011.35"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Page 467 of Sage Public Administration Abstracts Vol. 22, Issue 4 [page]

<span title="">1996</span> <i title="Sage Publications, Inc"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_sage-public-administration-abstracts" style="color: black;">Sage Public Administration Abstracts </a> </i> &nbsp;
INFORMATION FLOW. Access to information is a key element of democracy. What problems are cre- ated by federal government control of, and intervention in, access to information today?  ...  Certain dichotomies are central to the debate: information content versus carrier, citizens’ rights versus utilities, and the executive versus the legislative branch.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_sage-public-administration-abstracts_1996-01_22_4/page/467" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_sage-public-administration-abstracts_1996-01_22_4/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Software defined wireless sensor networks security challenges

Tebogo Kgogo, Bassey Isong, Adnan M. Abu-Mahfouz
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/joxi3hsj5ve7zgq75c6qf5sr6m" style="color: black;">2017 IEEE AFRICON</a> </i> &nbsp;
SDWSN is introduced to bring flexibility, programmability and innovation to the WSN network. However, SDWSN is not exempted from security challenges.  ...  SDWSN is faced with multitude of security challenges inherited from both SDN and WSN which have become a bottle-neck to its operations and applicability.  ...  We express our sincere appreciation and thanks to them as well as our colleagues in the Computer Science Department.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/afrcon.2017.8095705">doi:10.1109/afrcon.2017.8095705</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/africon/KgogoIA17.html">dblp:conf/africon/KgogoIA17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k3df4zj2f5fpzic6bche4wgkhe">fatcat:k3df4zj2f5fpzic6bche4wgkhe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180423004936/https://researchspace.csir.co.za/dspace/bitstream/handle/10204/10118/Kgogo_20462_2017.pdf;jsessionid=00DF950AA62030D36AB787D49C2E4249?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/13/a7139f8de2b9fcc9791992fe779a26c3ed0b4f74.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/afrcon.2017.8095705"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Distributed virtual machines

Emin Gün Sirer, Robert Grimm, Brian N. Bershad, Arthur J. Gregory, Sean McDirmid
<span title="">1998</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5mp2dg67onhjhm7g25cydvve2y" style="color: black;">Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications - EW 8</a> </i> &nbsp;
The services operate by intercepting application code and modifying it on the fly to provide additional service functionality.  ...  State of the art virtual machines are still monolithic, that is, they are comprised of closely-coupled service components, which are thus replicated over all computers in an organization.  ...  Acknowledgements We would like to thank Jim Roskind of Netscape, Charles Fitzgerald and Kory Srock of Microsoft, and Tim Lindholm, Sheng Liang, Marianne Mueller and Li Gong of Javasoft for discussing the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/319195.319198">doi:10.1145/319195.319198</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sigopsE/SirerGBGM98.html">dblp:conf/sigopsE/SirerGBGM98</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6chop26mwrezdkonirjrjbfl24">fatcat:6chop26mwrezdkonirjrjbfl24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040901064430/http://www.cs.cornell.edu:80/people/egs/papers/kimera-tr98-09-01.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/db/87db93667d870777e8ea8858a33e74b43e3e3a02.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/319195.319198"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Lessons Learned from Building a High-Assurance Crypto Gateway

Clark Weissman, Timothy Levin
<span title="">2011</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kt7pnevei5bd5ed4soqmccmdte" style="color: black;">IEEE Security and Privacy</a> </i> &nbsp;
valid OMB control number.  ...  Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently  ...  A policy domain helps enforce a set of security policies including information flow (noninterference), mandatory access control (MAC), and discretionary access control (DAC), as well as supporting policies  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/msp.2010.201">doi:10.1109/msp.2010.201</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k5zvshjmbndstgqtjt43ohdxzy">fatcat:k5zvshjmbndstgqtjt43ohdxzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923211102/http://www.dtic.mil/get-tr-doc/pdf?AD=ADA570736" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2e/fa/2efadf752707201fdb76e162a94f30e507f25d30.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/msp.2010.201"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Mils Architecture

Sergey Tverdyshev, Holger Blasum, Bruno Langenstein, Jonas Maebe, Bjorn De Sutter, Bertrand Leconte, Benoît Triquet, Kevin Müller, Michael Paulitsch, Axel Söding-Freiherr von Blomberg, Axel Tillequin
<span title="2013-09-30">2013</span> <i title="Zenodo"> Zenodo </i> &nbsp;
The practical aim of this document is two-fold: (1) to get a common understanding of MILS terms and definitions, and (2) to provide a framework to derive the information flow, access control and resource  ...  allocation of the demonstrators from individual MILS components.  ...  Acknowledgment The research leading to these results has received funding from the European Union"s Seventh Framework Programme (FP7/2007-2013) under grant agreement number 318353.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.45164">doi:10.5281/zenodo.45164</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4y2eq3i5pjdsperrvn5akkojtm">fatcat:4y2eq3i5pjdsperrvn5akkojtm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181102043656/https://zenodo.org/record/45164/files/EURO-MILS-D21.1-MILS-Architecture-PU-M12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/78/92789b7ea4bb4f3c355212b0a3356f0f47317853.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.45164"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 74,576 results