{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:00:02Z","timestamp":1743145202976,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_23","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"264-275","source":"Crossref","is-referenced-by-count":0,"title":["An Illegal Indirect Access Prevention Method in Transparent Computing System"],"prefix":"10.1007","author":[{"given":"Wenjuan","family":"Tang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"issue":"12A","key":"23_CR1","first-page":"169","volume":"32","author":"Y Zhang","year":"2004","unstructured":"Zhang, Y.: Transparence computing: concept, architecture and example. Acta Electronica Sin. 32(12A), 169\u2013173 (2004)","journal-title":"Acta Electronica Sin."},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11833529_1","volume-title":"Ubiquitous Intelligence and Computing","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Zhou, Y.: Transparent computing: a new paradigm for pervasive computing. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"23_CR3","unstructured":"Lapadula, L., Lapadula, L.J., Bell, D.E.: Secure computer systems: a mathematical model. Technical report 2547 (1996)"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1504\/IJCC.2012.049768","volume":"1","author":"H Xue","year":"2012","unstructured":"Xue, H., Dai, Y.: A privacy protection model for transparent computing system. Int. J. Cloud Comput. 1(4), 367\u2013384 (2012)","journal-title":"Int. J. Cloud Comput."},{"issue":"7","key":"23_CR5","first-page":"36","volume":"27","author":"Y Yang","year":"2003","unstructured":"Yang, Y., Ding, R., Min, Y.: Object-based access control model. Autom. Electr. Power Syst. 27(7), 36\u201340 (2003)","journal-title":"Autom. Electr. Power Syst."},{"issue":"1","key":"23_CR6","first-page":"76","volume":"14","author":"JB Deng","year":"2003","unstructured":"Deng, J.B., Hong, F.: Task-based access control model. J. Softw. 14(1), 76\u201382 (2003)","journal-title":"J. Softw."},{"key":"23_CR7","unstructured":"Ferraiolo, D., Kuhn, D.R., Chandramouli, R.: Role-based access control. Artech House (2003)"},{"issue":"10","key":"23_CR8","first-page":"1881","volume":"36","author":"F Li","year":"2008","unstructured":"Li, F., Wang, W., Ma, J., Liang, X.: Action-based access control model and administration of actions. Acta Electronica Sin. 36(10), 1881\u20131890 (2008)","journal-title":"Acta Electronica Sin."},{"issue":"5","key":"23_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"23_CR10","unstructured":"Cheng, W., Ports, D.R., Schultz, D.A., Popic, V., Blankstein, A., Cowling, J.A., Curtis, D., Shrira, L., Liskov, B.: Abstractions for usable information flow control in aeolus. In: USENIX Annual Technical Conference, pp. 139\u2013151 (2012)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-54792-8_9","volume-title":"Principles of Security and Trust","author":"A Bichhawat","year":"2014","unstructured":"Bichhawat, A., Rajani, V., Garg, D., Hammer, C.: Information flow control in WebKit\u2019s javascript bytecode. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 159\u2013178. Springer, Heidelberg (2014)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of javascript. In: 25th IEEE Computer Security Foundations Symposium, pp. 3\u201318 (2012)","DOI":"10.1109\/CSF.2012.19"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: Jsflow: tracking information flow in javascript and its apis. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1663\u20131671 (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"23_CR14","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: lightweight provenance for smart phone operating systems. In: USENIX Security Symposium, p. 24 (2011)"},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 5 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Doulikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Role-based information flow control models. In: 28th IEEE International Conference on Advanced Information Networking and Applications, pp. 1140\u20131147 (2014)","DOI":"10.1109\/AINA.2014.139"},{"issue":"1","key":"23_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TNSM.2013.122613.120358","volume":"11","author":"Y Zhou","year":"2014","unstructured":"Zhou, Y., Zhang, Y., Xie, Y., Zhang, H., Yang, L.T., Min, G.: Transcom: a virtual disk-based cloud computing platform for heterogeneous services. IEEE Trans. Netw. Serv. Manage. 11(1), 46\u201359 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"3","key":"23_CR18","first-page":"143","volume":"23","author":"J Chen","year":"2013","unstructured":"Chen, J., Jie, S., Zhang, X.: Implementation of virus prevention method based on file system filter driver. Comput. Technol. Dev. 23(3), 143\u2013146 (2013)","journal-title":"Comput. Technol. Dev."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Qiu, S., Tang, G., Wang, Y.: Research of file backup method based on double cache and minifilter driver. In: 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press (2015)","DOI":"10.2991\/ameii-15.2015.125"},{"key":"23_CR20","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-38968-9_20","volume-title":"Proceedings of the 13th International Conference on Man-Machine-Environment System Engineering","author":"J Chen","year":"2014","unstructured":"Chen, J., Ye, J.: Research on the file encryption system based on minifilter driver. In: Long, S., Dhillon, B.S. (eds.) Proceedings of the 13th International Conference on Man-Machine-Environment System Engineering. Lecture Notes in Electrical Engineering, pp. 175\u2013182. Springer, Heidelberg (2014)"},{"issue":"9","key":"23_CR21","first-page":"2045","volume":"8","author":"Z Li","year":"2012","unstructured":"Li, Z.: Research on the technology of dynamically access control based on file filter driver in windows system. Comput. Knowl. Technol. 8(9), 2045\u20132047 (2012)","journal-title":"Comput. Knowl. Technol."},{"issue":"4","key":"23_CR22","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1504\/IJCC.2012.049763","volume":"1","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Zhou, Y.: TransOS: a transparent computing-based operating system for the cloud. Int. J. Cloud Comput. 1(4), 287\u2013301 (2012)","journal-title":"Int. J. Cloud Comput."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:43:21Z","timestamp":1559303001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}