Shamon: A System for Distributed Mandatory Access Control, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.23-32, 2006. ,
DOI : 10.1109/ACSAC.2006.47
Enforcing mandatory access control in distributed systems using aspect orientation, 21st Nordic Workshop on Programming Theory ? NWPT2009, pp.62-64, 2009. ,
Information flow control in cloud computing, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-7, 2010. ,
DOI : 10.4108/icst.trustcol.2010.1
Information flow control for standard os abstractions, Proceedings of the 21st Symposium on Operating Systems Principles, 2007. ,
Making information flow explicit in HiStar, OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pp.263-278, 2006. ,
DOI : 10.1145/2018396.2018419
Labels and event processes in the asbestos operating system, SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, pp.17-30, 2005. ,
Frédéric Tronel, Valérie Viet Triem Tong Information flow control for intrusion detection derived from mac policy, Proceedings of the IEEE International Conference on Computer Communications (ICC), 2011. ,
A taint marking approach to confidentiality violation detection, 10th Australasian Information Security Conference, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00736045
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
A decentralized model for information flow control, ACM SIGOPS Operating Systems Review, vol.31, issue.5, pp.129-142, 1997. ,
DOI : 10.1145/269005.266669
Laminar: practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, 2009. ,
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000. ,
DOI : 10.1145/363516.363526
RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004. ,
DOI : 10.1109/MICRO.2004.31
Hardware enforcement of application security policies using tagged memory, Proceedings of OSDI USENIX Association, pp.225-240, 2008. ,
Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.116-127, 2007. ,
DOI : 10.1145/1315245.1315261
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005. ,
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones Virtualization with kvm, Proceedings of the 9th USENIX conference on Operating systems design and implementation, ser. OSDI'10. USENIX Association, pp.1-6, 2008. ,