{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:37:05Z","timestamp":1742913425024,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319661964"},{"type":"electronic","value":"9783319661971"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66197-1_1","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T21:02:30Z","timestamp":1502485350000},"page":"1-16","source":"Crossref","is-referenced-by-count":2,"title":["Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Georget","sequence":"first","affiliation":[]},{"given":"Mathieu","family":"Jaume","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Piolle","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Tronel","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie Viet Triem","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,13]]},"reference":[{"unstructured":"Cristi\u00e1, M., Mata, P.E.: Runtime enforcement of noninterference by duplicating processes and their memories. In: Workshop de Seguridad Inform\u00e1tica WSEGI, vol. 2009 (2009)","key":"1_CR1"},{"issue":"5","key":"1_CR2","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Georget, L., Jaume, M., Piolle, G., Tronel, F., Viet Triem Tong, V.: Verifying the reliability of operating system-level information flow control systems in Linux. In: FormaliSE: FME Workshop on Formal Methods in Software Engineering. IEEE, Buenos Aires, May 2017","key":"1_CR3","DOI":"10.1109\/FormaliSE.2017.1"},{"unstructured":"Hauser, C.: D\u00e9tection d\u2019intrusion dans les syst\u00e9mes distribu\u00e9s par propagation de teinte au niveau noyau. Ph.D. thesis, University of Rennes 1, France., June 2013","key":"1_CR4"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-45204-8_11","volume-title":"Information Systems Security","author":"M Jaume","year":"2013","unstructured":"Jaume, M., Andriatsimandefitra, R., Tong, V.V.T., M\u00e9, L.: Secure states versus secure executions. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 148\u2013162. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-45204-8_11"},{"doi-asserted-by":"crossref","unstructured":"Krohn, M., Tromer, E.: Noninterference for a practical DIFC-based operating system. In: IEEE Symposium on Security and Privacy, pp. 61\u201376. IEEE Computer Society, Washington, DC (2009)","key":"1_CR6","DOI":"10.1109\/SP.2009.23"},{"doi-asserted-by":"crossref","unstructured":"Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Symposium on Operating Systems Principles, pp. 321\u2013334. ACM, Stevenson, October 2007","key":"1_CR7","DOI":"10.1145\/1294261.1294293"},{"unstructured":"Nadkarni, A., Andow, B., Enck, W., Jha, S.: Practical DIFC enforcement on Android. In: 25th USENIX Security Symposium, USENIX Security 2016, pp. 1119\u20131136. USENIX Association, Austin, August 2016","key":"1_CR8"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2638548","volume":"37","author":"DE Porter","year":"2014","unstructured":"Porter, D.E., Bond, M.D., Roy, I., Mckinley, K.S., Witchel, E.: Practical fine-grained information flow control using laminar. ACM Trans. Program. Lang. Syst. 37(1), 1\u201351 (2014)","journal-title":"ACM Trans. Program. Lang. Syst."},{"doi-asserted-by":"crossref","unstructured":"Roy, I., Porter, D.: Laminar, August 2014. https:\/\/sourceforge.net\/p\/jikesrvm\/research-archive\/26","key":"1_CR10","DOI":"10.1002\/rwm3.20149"},{"doi-asserted-by":"crossref","unstructured":"Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 63\u201374. ACM, Dublin, June 2009","key":"1_CR11","DOI":"10.1145\/1542476.1542484"},{"unstructured":"The Coq Development Team: The Coq Proof Assistant Reference Manual. Technical report, Inria, December 2016","key":"1_CR12"},{"doi-asserted-by":"crossref","unstructured":"VanDeBogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Mazi\u00e9res, D.: Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst. 25(4), December 2007. Article No. 11. https:\/\/dl.acm.org\/citation.cfm?id=1314302","key":"1_CR13","DOI":"10.1145\/1314299.1314302"},{"unstructured":"Wright, C., Cowan, C., Smalley, S., Morris, J., Kroah-Hartman, G.: Linux security modules: general security support for the Linux kernel. In: USENIX Security Symposium, pp. 17\u201331. USENIX Association, San Francisco (2002)","key":"1_CR14"},{"unstructured":"Zimmermann, J., M\u00e9, L., Bidan, C.: Experimenting with a policy-based HIDS based on an information flow control model. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2003","key":"1_CR15"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66197-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T06:02:48Z","timestamp":1569996168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66197-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319661964","9783319661971"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66197-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}