Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.66-77, 1995. ,
DOI : 10.1109/SECPRI.1995.398923
Secure computer systems: Mathematical foundations, Tech. rep., DTIC Document, 1973. ,
Secure Ada Target: Issues, System Design, and Verification, 1985 IEEE Symposium on Security and Privacy, p.IEEE S&P, 1985. ,
DOI : 10.1109/SP.1985.10022
A further note on the confinement problem, Proceedings of IEEE International Carnahan Conference on Security Technology, pp.198-202, 1996. ,
DOI : 10.1109/CCST.1996.551864
Extending access control models with break-glass, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.197-206, 2009. ,
DOI : 10.1145/1542207.1542239
URL : http://epub.uni-regensburg.de/8625/1/petritsch.pdf
TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), pp.749-754, 2006. ,
DOI : 10.1109/ISCC.2006.158
URL : http://people.csail.mit.edu/qin_zhao/papers/zhao-iscc06-tainttrace.pdf
Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pp.196-206, 2007. ,
DOI : 10.1145/1273463.1273490
Cryptographic Enforcement of Role-Based Access Control, Lecture Notes in Computer Science, vol.29, issue.2, pp.191-205, 2011. ,
DOI : 10.1109/2.485845
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Labels and event processes in the asbestos operating system, In: SOSP, vol.5, pp.17-30, 2005. ,
TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, pp.255-270, 2010. ,
DOI : 10.1145/1629575.1629604
Fast exact and heuristic methods for role minimization problems. SACMAT pp, pp.1-10, 2008. ,
DOI : 10.1145/1377836.1377838
Cryptographically Enforced RBAC, 2013 IEEE 26th Computer Security Foundations Symposium, pp.115-129, 2013. ,
DOI : 10.1109/CSF.2013.15
Parameterized Complexity Theory (Texts in Theoretical Computer Science . An EATCS Series), 2006. ,
The complexity and composability of secure interoperation, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.190-200, 1994. ,
DOI : 10.1109/RISP.1994.296581
Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.303-311, 2005. ,
DOI : 10.1109/CSAC.2005.21
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, pp.72-86, 2011. ,
DOI : 10.1007/978-3-540-39650-5_17
URL : https://hal.archives-ouvertes.fr/hal-00647170
Information flow control for standard OS abstractions, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.321-334, 2007. ,
DOI : 10.1145/1323293.1294293
URL : http://www.pdos.csail.mit.edu/~max/docs/flume.pdf
A General Dynamic Information Flow Tracking Framework for Security Applications, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.463-472, 2006. ,
DOI : 10.1109/ACSAC.2006.6
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Trojan horse resistant discretionary access control, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.237-246, 2009. ,
DOI : 10.1145/1542207.1542244
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2008-8.pdf
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems, ACM Transactions on Information and System Security, vol.14, issue.3, pp.1-2427, 2011. ,
DOI : 10.1145/2043621.2043624
Rumpole, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.73-82, 2011. ,
DOI : 10.1145/1998441.1998453
A decentralized model for information flow control, ACM SIGOPS Operating Systems Review, vol.31, issue.5, pp.129-142, 1997. ,
DOI : 10.1145/269005.266669
Break-Glass: Handling Exceptional Situations in Access Control, 2014. ,
DOI : 10.1007/978-3-658-07365-7
Towards more usable information flow policies for contemporary operating systems, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, p.SACMAT, 2014. ,
DOI : 10.1145/2613087.2613110
Provenance-based Integrity Protection for Windows, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.211-220, 2015. ,
DOI : 10.1145/1029894.1029913
Node-and edge-deletion NP-complete problems, Proceedings of the tenth annual ACM symposium on Theory of computing , STOC '78, pp.253-264, 1978. ,
DOI : 10.1145/800133.804355
Edge-Deletion Problems, SIAM Journal on Computing, vol.10, issue.2, pp.297-309, 1981. ,
DOI : 10.1137/0210021
Role engineering using graph optimisation. SACMAT pp, pp.139-144, 2007. ,
DOI : 10.1145/1266840.1266862
Privacy Scope: A Precise information flow tracking system for finding application leaks, 2009. ,
An improved reference flow control model for policybased intrusion detection, ESORICS, pp.291-308, 2003. ,
DOI : 10.1007/978-3-540-39650-5_17
URL : https://hal.archives-ouvertes.fr/hal-00356444