{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:15:19Z","timestamp":1725614119376},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,20]]},"DOI":"10.1145\/1266840.1266876","type":"proceedings-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T19:20:55Z","timestamp":1190748055000},"page":"225-234","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Chinese-wall process confinement for practical distributed coalitions"],"prefix":"10.1145","author":[{"given":"Yasuharu","family":"Katsuno","sequence":"first","affiliation":[{"name":"IBM Research, Tokyo Research Laboratory, Shimotsuruma, Yamato-shi, Japan"}]},{"given":"Yuji","family":"Watanabe","sequence":"additional","affiliation":[{"name":"IBM Research, Tokyo Research Laboratory, Shimotsuruma, Yamato-shi, Japan"}]},{"given":"Sanehiro","family":"Furuichi","sequence":"additional","affiliation":[{"name":"IBM Research, Tokyo Research Laboratory, Shimotsuruma, Yamato-shi, Japan"}]},{"given":"Michiharu","family":"Kudo","sequence":"additional","affiliation":[{"name":"IBM Research, Tokyo Research Laboratory, Shimotsuruma, Yamato-shi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2007,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ao and Naftaly Minsky. Flexible Regulation of Distributed Coalitions. In Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS2003)","author":"Xuhui","year":"2003","unstructured":"Xuhui Ao and Naftaly Minsky. Flexible Regulation of Distributed Coalitions. In Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS2003) , 2003 . Xuhui Ao and Naftaly Minsky. Flexible Regulation of Distributed Coalitions. In Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS2003), 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_3_1","volume-title":"Tech Trend Notes","author":"Meushaw Robert","year":"2000","unstructured":"Robert Meushaw and Donald Simard . NetTop: Commercial Technology in High Assurance Applications . In Tech Trend Notes Volume 9 Edition 4, National Security Agency , 2000 . Robert Meushaw and Donald Simard. NetTop: Commercial Technology in High Assurance Applications. In Tech Trend Notes Volume 9 Edition 4, National Security Agency, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ACSAC.2006.47"},{"key":"e_1_3_2_1_5_1","volume-title":"Sadeghi and Christian Stuble. Towards Multilateral Security on DRM Platforms. In Proceedings of the first Information Security Practice and Experience Conference (ISPEC 2005)","author":"Ahmad-Reza","year":"2005","unstructured":"Ahmad-Reza Sadeghi and Christian Stuble. Towards Multilateral Security on DRM Platforms. In Proceedings of the first Information Security Practice and Experience Conference (ISPEC 2005) , 2005 . Ahmad-Reza Sadeghi and Christian Stuble. Towards Multilateral Security on DRM Platforms. In Proceedings of the first Information Security Practice and Experience Conference (ISPEC 2005), 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Ramon Caceres. Trusted Virtual Domains: Toward Secure Distributed Services. In Proceedings of the IEEE First Workshop on Hot Topics in System Dependability (Hot-Dep 2005)","author":"Griffin John Linwood","year":"2005","unstructured":"John Linwood Griffin , Trent Jaeger , Ronald Perez , Reiner Sailer , Leendert van Doorn , and Ramon Caceres. Trusted Virtual Domains: Toward Secure Distributed Services. In Proceedings of the IEEE First Workshop on Hot Topics in System Dependability (Hot-Dep 2005) , 2005 . John Linwood Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer, Leendert van Doorn, and Ramon Caceres. Trusted Virtual Domains: Toward Secure Distributed Services. In Proceedings of the IEEE First Workshop on Hot Topics in System Dependability (Hot-Dep 2005), 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/362375.362389"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_9_1","volume-title":"Towards Multi Layer Trusted Virtual Domains. In the 2nd Workshop on Advances in Trusted Computing (WATC","author":"Katsuno Yasuharu","year":"2006","unstructured":"Yasuharu Katsuno , Michiharu Kudo , Yuji Watanabe , Sachiko Yoshihama , Ronald Perez , Reiner Sailer , and Leendert vanDoorn . Towards Multi Layer Trusted Virtual Domains. In the 2nd Workshop on Advances in Trusted Computing (WATC Fall 2006 ), 2006. Yasuharu Katsuno, Michiharu Kudo, Yuji Watanabe, Sachiko Yoshihama, Ronald Perez, Reiner Sailer, and Leendert vanDoorn. Towards Multi Layer Trusted Virtual Domains. In the 2nd Workshop on Advances in Trusted Computing (WATC Fall 2006), 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/2163273.2163278"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1179474.1179480"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Symposium on Research in Security and Privacy (Oakland)","author":"Nash David","year":"1989","unstructured":"David F. C. and Michael J. Nash . The Chinese Wall Security Policy . In Proceedings of the Symposium on Research in Security and Privacy (Oakland) , 1989 . David F. C. and Michael J. Nash. The Chinese Wall Security Policy. In Proceedings of the Symposium on Research in Security and Privacy (Oakland), 1989."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.5555\/647054.715771"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/996943.996944"},{"key":"e_1_3_2_1_15_1","volume-title":"Trent Jaeger. Using CQUAL for Static Analysis of Authorization Hook Placement. In Proceedings of the 11th USENIX Security Symposium","author":"Zhang Xiaolan","year":"2002","unstructured":"Xiaolan Zhang , Antony Edwards , and Trent Jaeger. Using CQUAL for Static Analysis of Authorization Hook Placement. In Proceedings of the 11th USENIX Security Symposium , 2002 . Xiaolan Zhang, Antony Edwards, and Trent Jaeger. Using CQUAL for Static Analysis of Authorization Hook Placement. In Proceedings of the 11th USENIX Security Symposium, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/586110.586141"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of USENIX 2003 Annual Technical Conference","author":"Watson Robert","year":"2003","unstructured":"Robert Watson , Wayne Morrison , Chris Vance , and Brian Feldman . The Trusted BSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 . In Proceedings of USENIX 2003 Annual Technical Conference , 2003 . Robert Watson, Wayne Morrison, Chris Vance, and Brian Feldman. The Trusted BSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0. In Proceedings of USENIX 2003 Annual Technical Conference, 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of Symposium on Cryptography and Information Security 2006 (SCIS 2006) (in Japanese)","author":"Furuichi Sanehiro","year":"2006","unstructured":"Sanehiro Furuichi , Takuya Mishina , and Tasuku Otani . The Design and Implementation of Real-time Program Monitoring and Controlling Mechanism on PC for Information Security System . In Proceedings of Symposium on Cryptography and Information Security 2006 (SCIS 2006) (in Japanese) , 2006 . Sanehiro Furuichi, Takuya Mishina, and Tasuku Otani. The Design and Implementation of Real-time Program Monitoring and Controlling Mechanism on PC for Information Security System. In Proceedings of Symposium on Cryptography and Information Security 2006 (SCIS 2006) (in Japanese), 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"Mark Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland)","author":"Fraser Timothy","year":"1999","unstructured":"Timothy Fraser , Lee Badger , and Mark Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland) , 1999 . Timothy Fraser, Lee Badger, and Mark Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 1999."},{"key":"e_1_3_2_1_20_1","volume-title":"Hunt and Doug Brubacher. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd USENIX Windows NT Symposium","author":"Galen","year":"1999","unstructured":"Galen Hunt and Doug Brubacher. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd USENIX Windows NT Symposium , 1999 . Galen Hunt and Doug Brubacher. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd USENIX Windows NT Symposium, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_22_1","volume-title":"Doorn. Design and Implementation of A TCG-based Integrity Measurement Architecture. In Proceedings of the 11th USENIX Security Symposium","author":"Sailer Reiner","year":"2004","unstructured":"Reiner Sailer , Xiaolan Zhang , Trent Jaeger , and Leendert van Doorn. Design and Implementation of A TCG-based Integrity Measurement Architecture. In Proceedings of the 11th USENIX Security Symposium , 2004 . Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and Implementation of A TCG-based Integrity Measurement Architecture. In Proceedings of the 11th USENIX Security Symposium, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1030083.1030125"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Second IEEE International Conference on Security and Privacy for Communication Networks","author":"Jaeger Trent","year":"2006","unstructured":"Trent Jaeger , Kevin Butler , David H. King , Serge Hallyn , Joy Latten , and Xiaolan Zhang . Leveraging IPsec for Mandatory Access Control across Systems . In Proceedings of the Second IEEE International Conference on Security and Privacy for Communication Networks , 2006 . Trent Jaeger, Kevin Butler, David H. King, Serge Hallyn, Joy Latten, and Xiaolan Zhang. Leveraging IPsec for Mandatory Access Control across Systems. In Proceedings of the Second IEEE International Conference on Security and Privacy for Communication Networks, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.5555\/998684.1006924"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/501983.501991"},{"key":"e_1_3_2_1_28_1","volume-title":"Greg KroahHartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium","author":"Wright Chris","year":"2002","unstructured":"Chris Wright , Crispin Cowan , James Morris , Stephen Smalley , and Greg KroahHartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium , 2002 . Chris Wright, Crispin Cowan, James Morris, Stephen Smalley, and Greg KroahHartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium, 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"David Chizmadia. Design of the EROS Trusted Window System. In Proceedings of the 13th USENIX Security Symposium","author":"Shapiro Jonathan S.","year":"2004","unstructured":"Jonathan S. Shapiro , John Vanderburgh , Eric Northup , and David Chizmadia. Design of the EROS Trusted Window System. In Proceedings of the 13th USENIX Security Symposium , 2004 . Jonathan S. Shapiro, John Vanderburgh, Eric Northup, and David Chizmadia. Design of the EROS Trusted Window System. In Proceedings of the 13th USENIX Security Symposium, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/CSAC.2005.7"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"SACMAT07","name":"SACMAT07: 12th ACM Symposium on Access Control Models and Technologies","location":"Sophia Antipolis France"},"container-title":["Proceedings of the 12th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1266840.1266876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T06:14:52Z","timestamp":1672985692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266840.1266876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,20]]},"references-count":30,"alternative-id":["10.1145\/1266840.1266876","10.1145\/1266840"],"URL":"https:\/\/doi.org\/10.1145\/1266840.1266876","relation":{},"subject":[],"published":{"date-parts":[[2007,6,20]]},"assertion":[{"value":"2007-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}