Entry Mao:2011:CDP from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Mao:2011:CDP,
author = "Ziqing Mao and Ninghui Li and Hong Chen and Xuxian
Jiang",
title = "Combining Discretionary Policy with Mandatory
Information Flow in Operating Systems",
journal = j-TISSEC,
volume = "14",
number = "3",
pages = "24:1--24:??",
month = nov,
year = "2011",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2043621.2043624",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Dec 15 09:12:37 MST 2011",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Discretionary Access Control (DAC) is the primary
access control mechanism in today's major operating
systems. It is, however, vulnerable to Trojan Horse
attacks and attacks exploiting buggy software. We
propose to combine the discretionary policy in DAC with
the dynamic information flow techniques in MAC,
therefore achieving the best of both worlds, that is,
the DAC's easy-to-use discretionary policy
specification and MAC's defense against threats caused
by Trojan Horses and buggy programs. We propose the
Information Flow Enhanced Discretionary Access Control
(IFEDAC) model that implements this design philosophy.
We describe our design of IFEDAC, and discuss its
relationship with the Usable Mandatory Integrity
Protection (UMIP) model proposed earlier by us.",
acknowledgement = ack-nhfb,
articleno = "24",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- best,
1(1)93,
10(4)1,
11(4)19,
12(3)16,
14(1)13,
15(2)10,
17(3)9
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- caused,
10(4)6,
17(4)13
- Chen, Hong,
13(4)36
- combine,
12(4)20,
13(3)22,
13(4)33,
14(1)5,
15(3)13,
16(4)15
- combining,
1(1)93,
13(1)10,
13(3)22,
15(1)5
- DAC,
9(4)391
- defense,
2(3)230,
11(2)3,
12(2)11,
14(1)7,
14(3)27,
14(4)31,
15(2)6,
15(4)16,
16(4)13,
17(2)8,
17(3)11
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
7(2)319,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- discretionary,
3(2)85,
9(4)391
- discuss,
2(1)105,
10(2)5,
10(2)8,
11(1)2,
11(2)1,
12(4)20,
12(4)22,
13(3)22,
13(3)25,
13(4)35,
17(1)3,
18(2)7
- dynamic,
2(1)65,
3(3)136,
5(4)367,
7(1)21,
10(2)7,
10(4)4,
11(2)3,
11(3)15,
12(1)6,
12(2)10,
12(3)18,
13(2)14,
13(4)32,
14(2)15,
15(3)13,
16(2)5,
17(2)5,
17(4)15,
18(3)11
- earlier,
12(1)5
- enhanced,
2(1)34,
10(1)2,
11(4)22,
14(4)29,
15(2)7
- exploiting,
12(2)13,
13(3)22,
15(3)14,
17(3)9
- flow,
1(1)26,
1(1)93,
10(2)7,
12(1)5,
12(2)11,
13(3)26,
15(1)2,
16(1)1,
16(2)6,
18(2)8
- horses,
13(4)30
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(3)15,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)35,
13(4)38,
13(4)39,
14(1)14,
14(4)28,
14(4)29,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(1)4,
17(3)12,
17(4)15,
18(1)1,
18(2)7,
18(4)13
- implement,
2(2)177,
9(4)461,
11(1)3,
11(3)14,
11(3)16,
12(1)4,
12(2)13,
14(1)6,
14(1)10,
14(4)31,
15(2)6,
16(2)6,
16(2)8,
16(3)10,
16(4)14,
17(2)6,
17(3)10
- integrity,
1(1)26,
1(1)93,
2(1)65,
2(1)105,
3(1)51,
10(2)8,
10(3)11,
11(3)14,
12(1)6,
12(3)14,
13(1)4,
13(1)5,
13(3)25,
17(2)6,
17(4)15,
18(2)5
- Jiang, Xuxian,
13(2)12
- Li, Ninghui,
6(1)128,
9(3)352,
9(4)391,
10(2)5,
12(4)20,
13(1)2,
13(4)36,
13(4)40,
14(1)1
- MAC,
11(4)19,
13(3)26,
18(2)6
- major,
9(4)391,
10(3)12,
10(4)3
- mandatory,
3(2)85,
13(3)26,
18(2)6
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
10(4)6,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- operating,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
4(1)72,
5(1)36,
11(4)20,
12(3)14,
13(1)10,
13(4)30,
14(1)6,
14(1)8,
15(4)16,
17(4)14,
18(2)5,
18(3)11
- philosophy,
2(3)269
- primary,
11(2)5,
14(1)2
- program,
2(1)65,
2(3)332,
11(3)14,
12(1)1,
12(2)10,
12(2)11,
12(3)16,
12(3)19,
13(3)21,
15(1)2,
15(2)10,
16(2)7,
17(1)2,
17(3)11,
18(1)4
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- protection,
1(1)3,
1(1)26,
1(1)66,
1(1)93,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)295,
2(4)354,
2(4)390,
10(1)3,
10(3)9,
11(4)20,
12(2)9,
12(2)11,
13(3)22,
15(1)2,
15(2)8,
16(2)6
- relationship,
2(1)3,
2(4)390,
6(1)43,
9(2)162,
9(4)391,
10(4)2,
10(4)3,
12(1)2,
13(4)40,
14(4)30,
15(4)18,
17(2)7
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
3(1)51,
11(1)2,
12(2)11,
12(2)12,
12(3)14,
12(3)19,
14(1)8,
14(4)32,
15(2)8,
17(1)1,
17(3)11
- specification,
1(1)26,
2(1)65,
2(2)177,
3(4)207,
6(4)501,
8(2)187,
8(4)351,
10(2)7,
10(2)8,
10(3)9,
10(4)2,
11(1)4,
11(4)19,
13(3)24,
13(3)26,
15(3)13,
15(4)16,
16(1)3,
16(1)4,
16(4)13,
17(2)5,
17(4)16,
18(2)7,
18(2)8
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- therefore,
2(2)177,
10(4)4,
11(4)19,
12(2)11,
13(1)10,
13(3)28,
15(1)5,
15(4)16,
17(1)3
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(1)7,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- today,
10(2)5,
10(3)12,
14(4)31,
16(2)8,
16(3)11,
17(3)11
- Trojan,
13(4)30
- us.,
13(3)28
- usable,
18(4)13
- vulnerable,
10(3)11,
10(4)5,
10(4)6,
11(3)15,
11(4)22,
12(2)11,
13(1)10,
13(3)25,
14(3)27,
15(4)16,
16(4)13,
17(1)4
- world,
14(1)4,
16(3)9,
16(3)10,
17(4)16