{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:09:00Z","timestamp":1725455340109},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/hpcs.2010.5547118","type":"proceedings-article","created":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T18:21:20Z","timestamp":1282155680000},"page":"291-298","source":"Crossref","is-referenced-by-count":2,"title":["Mandatory Access Control for shared HPC clusters: Setup and performance evaluation"],"prefix":"10.1109","author":[{"given":"Mathieu","family":"Blanc","sequence":"first","affiliation":[]},{"given":"Jean-Francois","family":"Lalande","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Distributed access control for carrier class clusters","author":"pourzandi","year":"2003","journal-title":"Proceedings of the Parallel and Distributed Processing Techniques and Applications (PDPTA '03) Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTDC.2006.4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273025"},{"key":"ref13","article-title":"Integrating flexible support for security policies into the linux operating system","author":"loscocco","year":"2001","journal-title":"Proceedings of the FREENIX Track 2001 USENIX Annual Technical Conference (FREENIX '01)"},{"key":"ref14","article-title":"A step-by-step guide to building a new SELinux policy module","author":"walsh","year":"2007","journal-title":"Red Hat Magazine"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.5.423-432"},{"article-title":"Confining the User with SELinux","year":"2007","author":"walsh","key":"ref16"},{"key":"ref17","first-page":"195","article-title":"Mandatory access control implantation against potential nfs vulner-abilities","author":"blanc","year":"2009","journal-title":"Workshop on Collaboration and Security 2009"},{"key":"ref18","article-title":"MAC Security Label Requirements for NFSv4","author":"quigley","year":"2008","journal-title":"IETF Tech Rep"},{"year":"2009","key":"ref19","article-title":"Labeled NFS"},{"key":"ref4","first-page":"437","article-title":"Protection","author":"lampson","year":"0","journal-title":"The 5th Symposium on Information Sciences and Systems"},{"key":"ref3","article-title":"Implementing SELinux as a linux security module","author":"smalley","year":"2001","journal-title":"NSA Tech Rep"},{"key":"ref6","article-title":"Integrity considerations for secure computer systems","author":"biba","year":"1975","journal-title":"Technical Report MTR-3153"},{"key":"ref5","article-title":"Secure computer systems: Mathematical foundations and model","author":"bell","year":"1973","journal-title":"Technical Report M74&#x2013;244"},{"article-title":"SELinux by Example","year":"2006","author":"mayer","key":"ref8"},{"key":"ref7","article-title":"A Security Policy Configuration for the Security-Enhanced Linux","author":"smalley","year":"2000","journal-title":"NSA Tech Rep"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2005.1558540"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.5.395-404"},{"key":"ref1","article-title":"Cluster security as a unique problem with emergent properties: Issues and techniques","author":"yurcik","year":"2004","journal-title":"5th LCI Intl Conference on Linux Clusters"},{"article-title":"files on Lustre filesystem are unlabeled_t","year":"2009","author":"bastian","key":"ref20"},{"article-title":"On exploiting null ptr derefs, disabling SELinux, and silently fixed Linux vulns","year":"2007","author":"spengler","key":"ref22"},{"year":"2009","key":"ref21","article-title":"Lustre Roadmap"}],"event":{"name":"Simulation (HPCS)","start":{"date-parts":[[2010,6,28]]},"location":"Caen, France","end":{"date-parts":[[2010,7,2]]}},"container-title":["2010 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5538704\/5547051\/05547118.pdf?arnumber=5547118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T05:22:46Z","timestamp":1489900966000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5547118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hpcs.2010.5547118","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}