{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:23:10Z","timestamp":1725556990292},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/iscc.2008.4625645","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T15:09:41Z","timestamp":1221750581000},"page":"386-391","source":"Crossref","is-referenced-by-count":0,"title":["FlexBox: Sandboxing internet servers based on layer-7 contexts"],"prefix":"10.1109","author":[{"family":"Ayumu Tanoue","sequence":"first","affiliation":[]},{"family":"Makoto Shimamura","sequence":"additional","affiliation":[]},{"family":"Miyuki Hanaoka","sequence":"additional","affiliation":[]},{"given":"Kenji","family":"Kono","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945448"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264934"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.23"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"13","first-page":"207","article-title":"a flexible containment mechanism for executing untrusted code","author":"peterson","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"14","first-page":"257","article-title":"improving host security with system call policies","author":"provos","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"key":"11","first-page":"19","article-title":"user-level infrastructure for system call interposition: a platform for intrusion detection and confinement","author":"jain","year":"2000","journal-title":"Proceedings of the ISOC Symposium on Network and Distributed Security"},{"key":"12","first-page":"33","article-title":"improving internet server security by filtering on tcp streams","author":"kono","year":"2005","journal-title":"Transactions of Information Processing Society of Japan"},{"key":"3","first-page":"214","article-title":"a reference monitor system with policy-switching mechanism at runtime","author":"abe","year":"2003","journal-title":"Japan Society for Software Science and Technology"},{"journal-title":"SecurityFocus","year":"0","key":"2"},{"journal-title":"Apache http server tomcat directory traversal vulnerability","year":"0","key":"1"},{"key":"10","first-page":"1","article-title":"a secure environment for untrusted helper applications","author":"goldberg","year":"1996","journal-title":"Proceedings of the 6th USENIX Security Symposium"},{"key":"7","first-page":"173","article-title":"bluebox: a policy-driven, host-based instrusion detection system","author":"chari","year":"2002","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS'02)"},{"key":"6","first-page":"57","article-title":"privtrans: automatically partitioning programs for privilege separation","author":"brumley","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"key":"5","first-page":"165","article-title":"tron: process-specific file protection for the unix operating system","author":"berman","year":"1995","journal-title":"Proceedings of the USENIX Winter 1995 Technical Conference"},{"key":"4","first-page":"1","article-title":"mapbox: using parameterized behavior classes to confine applications","author":"acharya","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"key":"9","article-title":"ostia: a delegating architecture for secure system call interposition","author":"garfinkel","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"8","first-page":"355","article-title":"subdomain: parsimonious server security","author":"cowan","year":"2000","journal-title":"Proc 14th Systems Administration Conference"}],"event":{"name":"2008 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2008,7,6]]},"location":"Marrakech","end":{"date-parts":[[2008,7,9]]}},"container-title":["2008 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607772\/4625572\/04625645.pdf?arnumber=4625645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:53:59Z","timestamp":1489751639000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4625645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscc.2008.4625645","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}