{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:39Z","timestamp":1763467719671,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102120.1102164","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"330-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Automatic placement of authorization hooks in the linux security modules framework"],"prefix":"10.1145","author":[{"given":"Vinod","family":"Ganapathy","sequence":"first","affiliation":[{"name":"University of Wisconsin"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"5th USENIX UNIX Security","author":"Badger L.","year":"1995","unstructured":"L. Badger , D. Sterne , D. Sherman , K. Walker , and S. Haghighat . A domain and type enforcement UNIX prototype . In 5th USENIX UNIX Security , June 1995 . L. Badger, D. Sterne, D. Sherman, K. Walker, and S. Haghighat. A domain and type enforcement UNIX prototype. In 5th USENIX UNIX Security, June 1995."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"key":"e_1_3_2_1_6_1","volume-title":"Computers and Intractability","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . Computers and Intractability . Freeman , New York, NY , 1979 . M. R. Garey and D. S. Johnson. Computers and Intractability. Freeman, New York, NY, 1979."},{"key":"e_1_3_2_1_7_1","volume-title":"Pearson Education","author":"Gong L.","year":"2003","unstructured":"L. Gong and G. Ellison . Inside JavaTM 2 Platform Security: Architecture, API Design, and Implementation . Pearson Education , 2003 . L. Gong and G. Ellison. Inside JavaTM 2 Platform Security: Architecture, API Design, and Implementation. Pearson Education, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1066473.1066478"},{"key":"e_1_3_2_1_9_1","unstructured":"Example idioms. www.cs.wisc.edu\/~vg\/papers\/ccs2005a\/idioms.html.  Example idioms. www.cs.wisc.edu\/~vg\/papers\/ccs2005a\/idioms.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996944"},{"key":"e_1_3_2_1_11_1","volume-title":"12th USENIX Security","author":"Jaeger T.","year":"2003","unstructured":"T. Jaeger , R. Sailer , and X. Zhang . Analyzing integrity protection in the SELinux example policy . In 12th USENIX Security , August 2003 . T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the SELinux example policy. In 12th USENIX Security, August 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"e_1_3_2_1_14_1","volume-title":"INRIA Rocquencourt","author":"Leroy X.","year":"2004","unstructured":"X. Leroy , D. Doligez , J. Garrigue , D. R\u00e9my , and J. Vouillon . The Objective Caml system (release 3.08). Technical report , INRIA Rocquencourt , July 2004 . X. Leroy, D. Doligez, J. Garrigue, D. R\u00e9my, and J. Vouillon. The Objective Caml system (release 3.08). Technical report, INRIA Rocquencourt, July 2004."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Annual Technical","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In USENIX Annual Technical , June 2001 . P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical, June 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.48795"},{"key":"e_1_3_2_1_17_1","volume-title":"Advanced Compiler Design and Implementation. Morgan Kaufmann","author":"Muchnick S. S.","year":"1997","unstructured":"S. S. Muchnick . Advanced Compiler Design and Implementation. Morgan Kaufmann , 1997 . S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann, 1997."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647478.727796"},{"key":"e_1_3_2_1_19_1","first-page":"189","volume-title":"Program Flow Analysis: Theory and Applications","author":"Sharir M.","year":"1981","unstructured":"M. Sharir and A. Pnueli . Two approaches to interprocedural dataflow analysis . In S. Muchnick and N. Jones, editors, Program Flow Analysis: Theory and Applications , pages 189 -- 233 . Prentice Hall , 1981 . M. Sharir and A. Pnueli. Two approaches to interprocedural dataflow analysis. In S. Muchnick and N. Jones, editors, Program Flow Analysis: Theory and Applications, pages 189--233. Prentice Hall, 1981."},{"key":"e_1_3_2_1_20_1","unstructured":"Simplify. http:\/\/research.compaq.com\/SRC\/esc\/Simplify.html.  Simplify. http:\/\/research.compaq.com\/SRC\/esc\/Simplify.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Tresys Technology. Security-enhanced Linux policy management framework. http:\/\/sepolicy-server.sourceforge.net.  Tresys Technology. Security-enhanced Linux policy management framework. http:\/\/sepolicy-server.sourceforge.net."},{"key":"e_1_3_2_1_22_1","volume-title":"11th USENIX Security","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. Kroah-Hartman . Linux security modules: General security support for the Linux kernel . In 11th USENIX Security , August 2002 . C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In 11th USENIX Security, August 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720279"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 12th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102120.1102164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:07Z","timestamp":1750262887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":20,"alternative-id":["10.1145\/1102120.1102164","10.1145\/1102120"],"URL":"https:\/\/doi.org\/10.1145\/1102120.1102164","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}