{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:16:50Z","timestamp":1729628210399,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215385","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T08:17:03Z","timestamp":1340266623000},"page":"250-255","source":"Crossref","is-referenced-by-count":1,"title":["Towards designing secure virtualized systems"],"prefix":"10.1109","author":[{"given":"Hedi","family":"Benzina","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61770-1_28","article-title":"Role hierarchies and constraints for lattice-based access controls","author":"sandhu","year":"1996","journal-title":"ESORICS"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer System Unified Exposition and Multics Interpretation"},{"key":"18","doi-asserted-by":"crossref","first-page":"159","DOI":"10.3233\/JCS-1992-1203","article-title":"Aggregation and separation as noninterference properties","volume":"1","author":"foley","year":"1992","journal-title":"Journal of Computer Security"},{"key":"15","article-title":"Logic in Virtualized Systems","author":"benzina","year":"0","journal-title":"ICCANS'11"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19348-4_18"},{"key":"13","first-page":"286","article-title":"The Orchids intrusion detection tool","volume":"3576","author":"olivain","year":"2005","journal-title":"LNCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89247-2_1"},{"journal-title":"2008 IEEE Asia-Pacific Services Computing Conference","article-title":"Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers","year":"0","key":"11"},{"key":"12","article-title":"A temporal-logic extension of role-based access control covering dynamic separation of duties","author":"mossakowski","year":"0","journal-title":"TIME-ICTL 2003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266447"},{"year":"2011","key":"3"},{"key":"20","first-page":"140","article-title":"Using mandatory integrity to enforce 'commerical' security","author":"lee","year":"0","journal-title":"Proceedings of Symposium on Security and Privacy"},{"year":"2011","key":"2"},{"year":"2005","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1109\/CSAC.2005.13","article-title":"Building a macbased security architecture for the xen opensource hypervisor","author":"sailer","year":"2005","journal-title":"Proceedings of the 21st Annual Computer Security Applications Conference"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346271"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266853"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1496909.1496919"},{"year":"2011","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"journal-title":"Implementing SELinux as a Linux Security Module","year":"2001","author":"smalley","key":"8"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215385.pdf?arnumber=6215385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T01:05:10Z","timestamp":1561856710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215385","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}