{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:08:03Z","timestamp":1730225283460,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/hpcsim.2013.6641426","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:23:43Z","timestamp":1383074623000},"page":"273-280","source":"Crossref","is-referenced-by-count":1,"title":["PIGA-cluster: A distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment"],"prefix":"10.1109","author":[{"given":"D.","family":"Gros","sequence":"first","affiliation":[]},{"given":"M.","family":"Blanc","sequence":"additional","affiliation":[]},{"given":"J.","family":"Briffaut","sequence":"additional","affiliation":[]},{"given":"C.","family":"Toinard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2004.1392593"},{"journal-title":"A Distributed Security Infrastructure for Carrier Class Linux Clusters","year":"0","author":"pourzandi","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2005.1558540"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604068"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.1630924"},{"key":"13","first-page":"404","article-title":"Dynamic role and contextbased access control for grid applications","author":"yao","year":"2005","journal-title":"Parallel and Distributed Computing Applications and Technologies 2005 PDCAT 2005 Sixth International Conference on"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2010.18"},{"key":"11","first-page":"123","article-title":"The flask security architecture: System support for diverse security policies","author":"spencer","year":"1998","journal-title":"Proceedings of the Eighth USENIX Security Symposium"},{"year":"0","key":"12"},{"key":"21","first-page":"19","article-title":"Making information flow explicit in histar","author":"zeldovich","year":"2006","journal-title":"OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"20","article-title":"Improving mandatory access control for hpc clusters","author":"blanc","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"journal-title":"Formalization and Guaranty of System Security Properties Application to the Detection of Intrusions","year":"2007","author":"briffaut","key":"23"},{"key":"24","first-page":"44","article-title":"Piga-hips: Protection of a shared hpc cluster","volume":"4","author":"blanc","year":"2011","journal-title":"International Journal on Advances in Security"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29740-3_47"},{"key":"26","article-title":"Contro?le d'acce?s mandataire pour windows 7","author":"gros","year":"2012","journal-title":"Symposium sur la Se?curite? des Technologies de l'Information et des Communications 2012"},{"key":"3","article-title":"Integrity considerations for secure computer systems","author":"biba","year":"1975","journal-title":"The MITRE Corporation"},{"key":"2","article-title":"Secure computer systems: Mathematical foundations and model","author":"bell","year":"1973","journal-title":"The MITRE Corporation"},{"key":"10","first-page":"127","article-title":"A domain and type enforcement UNIX prototype","author":"badger","year":"1995","journal-title":"Proceedings of the 5th Usenix UNIX Security Symposium"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"7","first-page":"34","article-title":"Trusted path execution for the linux 2.6 kernel as a linux security module","author":"rahimi","year":"2004","journal-title":"ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference"},{"year":"0","key":"6"},{"journal-title":"The Bell and La Padula Security Model","year":"1984","author":"rushby","key":"5"},{"key":"4","first-page":"437","article-title":"Protection","author":"lampson","year":"1971","journal-title":"The 5th Symposium on Information Sciences and Systems"},{"key":"9","article-title":"Integrating flexible support for security policies into the linux operating system","author":"loscocco","year":"2001","journal-title":"2001 USENIX Annual Technical Conference (FREENIX '01)"},{"journal-title":"20 Years of Pax","year":"2012","author":"team","key":"8"}],"event":{"name":"2013 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2013,7,1]]},"location":"Helsinki, Finland","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6619547\/6641375\/06641426.pdf?arnumber=6641426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:54:56Z","timestamp":1490212496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2013.6641426","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}