{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:52Z","timestamp":1750307992311,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128848","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"201-211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Application security support in the operating system kernel"],"prefix":"10.1145","author":[{"given":"Manigandan","family":"Radhakrishnan","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, SEO, Chicago IL"}]},{"given":"Jon A.","family":"Solworth","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, SEO, Chicago IL"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the USENIX Security Symposium, Salt Lake City","author":"Badger L.","year":"1995","unstructured":"L. Badger , D. F. Sterne , D. L. Sherman , K. M. Walker , and S. A. Haghihat . A domain and type enforcement UNIX prototype . In Proc. of the USENIX Security Symposium, Salt Lake City , 1995 . L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghihat. A domain and type enforcement UNIX prototype. In Proc. of the USENIX Security Symposium, Salt Lake City, 1995."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.55089"},{"key":"e_1_3_2_1_5_1","first-page":"18","volume-title":"8th National Computer Security Conference","author":"Boebert W. E.","year":"1985","unstructured":"W. E. Boebert and R. Kain . A practical alternative to hierarchical integrity policies . In 8th National Computer Security Conference , pages 18 -- 27 , 1985 . W. E. Boebert and R. Kain. A practical alternative to hierarchical integrity policies. In 8th National Computer Security Conference, pages 18--27, 1985."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"e_1_3_2_1_7_1","first-page":"57","volume-title":"USENIX Security Symposium","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. X. Song . Privtrans: Automatically partitioning programs for privilege separation . In USENIX Security Symposium , pages 57 -- 72 , 2004 . D. Brumley and D. X. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium, pages 57--72, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720278"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775419"},{"key":"e_1_3_2_1_11_1","first-page":"554","volume-title":"15th National Computer Security Conference","author":"Ferraiolo D. F.","year":"1992","unstructured":"D. F. Ferraiolo and R. Kuhn . Role based access control . In 15th National Computer Security Conference , pages 554 -- 563 , Baltimore, MD , 1992 . D. F. Ferraiolo and R. Kuhn. Role based access control. In 15th National Computer Security Conference, pages 554--563, Baltimore, MD, 1992."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of the USENIX Security Symposium, Washington D.C.","author":"Fraser T.","year":"1999","unstructured":"T. Fraser . LOMAC-low water-mark mandatory access control for Linux . In Proc. of the USENIX Security Symposium, Washington D.C. , 1999 . T. Fraser. LOMAC-low water-mark mandatory access control for Linux. In Proc. of the USENIX Security Symposium, Washington D.C., 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319175"},{"key":"e_1_3_2_1_15_1","volume-title":"NDSS","author":"Jain K.","year":"2000","unstructured":"K. Jain and R. Sekar . User-level infrastructure for system call interposition: A platform for intrusion detection and confinement . In NDSS , 2000 . K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In NDSS, 2000."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.666843"},{"key":"e_1_3_2_1_17_1","volume-title":"Protection. In Fifth Princeton Symposium on Information Sciences and Systems","author":"Lampson B.","year":"1971","unstructured":"B. Lampson . Protection. In Fifth Princeton Symposium on Information Sciences and Systems , 1971 . B. Lampson. Protection. In Fifth Princeton Symposium on Information Sciences and Systems, 1971."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_19_1","first-page":"20","volume-title":"Proc. IEEE Symp. Security and Privacy","author":"Millen J.","year":"1999","unstructured":"J. Millen . Twenty years of covert channel modeling and analysis . In Proc. IEEE Symp. Security and Privacy , pages 20 -- 114 , 1999 . J. Millen. Twenty years of covert channel modeling and analysis. In Proc. IEEE Symp. Security and Privacy, pages 20--114, 1999."},{"key":"e_1_3_2_1_20_1","first-page":"147","volume-title":"Proc. 14th NIST-NCSC National Computer Security Conference","author":"O'Brien R.","year":"1991","unstructured":"R. O'Brien and C. Rogers . Developing applications on LOCK . In Proc. 14th NIST-NCSC National Computer Security Conference , pages 147 -- 156 , 1991 . R. O'Brien and C. Rogers. Developing applications on LOCK. In Proc. 14th NIST-NCSC National Computer Security Conference, pages 147--156, 1991."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884422"},{"key":"e_1_3_2_1_27_1","volume-title":"NAI Labs","author":"Smalley S.","year":"2001","unstructured":"S. Smalley , C. Vance , and W. Salamon . Implementing SELinux as a Linux security module. Report #01-043 , NAI Labs , Dec. 2001 . Revised April 2002. S. Smalley, C. Vance, and W. Salamon. Implementing SELinux as a Linux security module. Report #01-043, NAI Labs, Dec. 2001. Revised April 2002."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128852"},{"key":"e_1_3_2_1_29_1","volume-title":"Decidable administrative controls based on security properties","author":"Solworth J. A.","year":"2004","unstructured":"J. A. Solworth and R. H. Sloan . Decidable administrative controls based on security properties , 2004 . Available at http:\/\/parsys.cs.uic.edu\/~solworth\/kernelSec.html. J. A. Solworth and R. H. Sloan. Decidable administrative controls based on security properties, 2004. Available at http:\/\/parsys.cs.uic.edu\/~solworth\/kernelSec.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301315"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_15"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352622"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344307"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/230908.230915"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Technical Conference","author":"Watson R.","year":"2001","unstructured":"R. Watson . TrustedBSD : Adding trusted operating system features to FreeBSD . In USENIX Technical Conference , Boston, MA , 2001 . R. Watson. TrustedBSD: Adding trusted operating system features to FreeBSD. In USENIX Technical Conference, Boston, MA, 2001."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1478559.1478574"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of the USENIX Security Symposium","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. Kroah-Hartman . Linux Security Modules: General security support for the Linux Kernel . In Proc. of the USENIX Security Symposium , San Francisco, Ca. , 2002 . C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux Security Modules: General security support for the Linux Kernel. In Proc. of the USENIX Security Symposium, San Francisco, Ca., 2002."}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":33,"alternative-id":["10.1145\/1128817.1128848","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128848","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}