Secure computer system: Unified exposition and Multics interpretation, Tech. rep., MITRE Corp, 1976. ,
Integrity considerations for secure computer systems, Tech. rep., MITRE Corp, 1977. ,
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, 1987. ,
DOI : 10.1109/SP.1987.10001
Breaking up is hard to do, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, p.SOSP, 2011. ,
DOI : 10.1145/2043556.2043575
An Architecture for Modular Data Centers, p.CIDR, 2007. ,
The Nizza Secure-System Architecture, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2005. ,
DOI : 10.1109/COLCOM.2005.1651218
Jails: Confining the omnipotent root, p.0, 2000. ,
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Tech. rep., U.S. Secret Service and CMU, 2005. ,
Making Linux Protection Mechanisms Egalitarian with UserFS, USENIX Security Symposium, p.10, 2010. ,
seL4, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, p.SOSP, 2009. ,
DOI : 10.1145/1629575.1629596
Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector, Tech. rep., U.S. Secret Service and CMU, 2008. ,
Information Flow Control for Standard OS Abstractions, p.SOSP, 2007. ,
DOI : 10.1145/1323293.1294293
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.5684
TrustVisor: Efficient TCB Reduction and Attestation, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.17
Flicker: An Execution Infrastructure for TCB Minimization, p.EuroSys, 2008. ,
Improving Xen security through disaggregation, Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments , VEE '08, p.VEE, 2008. ,
DOI : 10.1145/1346256.1346278
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.1641
A Decentralized Model for Information Flow Control, p.SOSP, 1997. ,
DOI : 10.1145/269005.266669
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.8802
http://www.nsa.gov/selinux 30, Bootstrapping Trust in Commodity Computers . In: IEEE Symposium on Security and Privacy, 2001. ,
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services, 2012. ,
Logical attestation, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, p.SOSP, 2011. ,
DOI : 10.1145/2043556.2043580
NOVA, Proceedings of the 5th European conference on Computer systems, EuroSys '10, p.Eurosys, 2010. ,
DOI : 10.1145/1755913.1755935
The Linux System Administrator's Guide, 1993. ,
Making information flow explicit in HiStar, Communications of the ACM, vol.54, issue.11, p.OSDI, 2006. ,
DOI : 10.1145/2018396.2018419
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.264
CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, p.SOSP, 2011. ,
DOI : 10.1145/2043556.2043576