{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:32Z","timestamp":1772163932537,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,21]],"date-time":"2007-03-21T00:00:00Z","timestamp":1174435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,21]]},"DOI":"10.1145\/1272996.1273033","type":"proceedings-article","created":{"date-parts":[[2012,10,10]],"date-time":"2012-10-10T10:45:29Z","timestamp":1349865929000},"page":"355-368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Authorizing applications in singularity"],"prefix":"10.1145","author":[{"given":"Ted","family":"Wobber","sequence":"first","affiliation":[{"name":"Microsoft Research, Silicon Valley"}]},{"given":"Aydan","family":"Yumerefendi","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Mart\u00edn","family":"Abadi","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley"}]},{"given":"Andrew","family":"Birrell","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley"}]},{"given":"Daniel R.","family":"Simon","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond"}]}],"member":"320","published-online":{"date-parts":[[2007,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"127","volume-title":"Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X)","author":"Abadi M.","year":"2005","unstructured":"M. Abadi , A. Birrell , and T. Wobber . Access Control in a World of Software Diversity . In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X) , Santa Fe, NM , pp. 127 -- 132 , June 2005 . M. Abadi, A. Birrell, and T. Wobber. Access Control in a World of Software Diversity. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X), Santa Fe, NM, pp. 127--132, June 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178597.1178599"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.21236\/AD0772806","volume-title":"Computer Security Technology Planning Study","author":"Anderson J.","year":"1972","unstructured":"J. Anderson . Computer Security Technology Planning Study Volume II . ESD-TR-73-51. Air Force Systems Command , Oct. 1972 . J. Anderson. Computer Security Technology Planning Study Volume II. ESD-TR-73-51. Air Force Systems Command, Oct. 1972."},{"key":"e_1_3_2_1_5_1","first-page":"58","volume-title":"Security Engineering","author":"Anderson R.","year":"2001","unstructured":"R. Anderson . Security Engineering . John Wiley & Sons , Chapter 4: Access Control, pp. 58 -- 59 . 2001 (also http:\/\/www.cl.cam.ac.uk\/~rjal4\/book.html). R. Anderson. Security Engineering. John Wiley & Sons, Chapter 4: Access Control, pp. 58--59. 2001 (also http:\/\/www.cl.cam.ac.uk\/~rjal4\/book.html)."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"47","article-title":"A Domain and Type Enforcement UNIX Prototype","volume":"9","author":"Badger L.","year":"1996","unstructured":"L. Badger . A Domain and Type Enforcement UNIX Prototype . USENIX Comp. Sys. , 9 ( 1 ): 47 -- 83 , Winter 1996 . L. Badger. A Domain and Type Enforcement UNIX Prototype. USENIX Comp. Sys., 9(1): 47--83, Winter 1996.","journal-title":"USENIX Comp. Sys."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.9"},{"key":"e_1_3_2_1_9_1","volume-title":"Volume 1: The Common Language Runtime","author":"Box D.","year":"2002","unstructured":"D. Box . Essential .NET , Volume 1: The Common Language Runtime . Addison-Wesley Professional ( 2002 ). D. Box. Essential .NET, Volume 1: The Common Language Runtime. Addison-Wesley Professional (2002)."},{"key":"e_1_3_2_1_10_1","volume-title":"Programming Windows Security","author":"Brown K.","year":"2000","unstructured":"K. Brown . Programming Windows Security . Addison-Wesley Professional ( 2000 ). K. Brown. Programming Windows Security. Addison-Wesley Professional (2000)."},{"key":"e_1_3_2_1_11_1","volume-title":"ECMA Standard ECMA-334","author":"International ECMA","year":"2006","unstructured":"ECMA International . C# Language Specification. ECMA Standard ECMA-334 . June 2006 . http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-334.pdf. ECMA International. C# Language Specification. ECMA Standard ECMA-334. June 2006. http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-334.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217953"},{"key":"e_1_3_2_1_14_1","first-page":"554","volume-title":"Proceedings of the 15th National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and D. Kuhn , Role-Based Access Control , In Proceedings of the 15th National Computer Security Conference , pp. 554 -- 563 , 1992 . D. Ferraiolo and D. Kuhn, Role-Based Access Control, In Proceedings of the 15th National Computer Security Conference, pp. 554--563, 1992."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Second Workshop on Electronic Commerce","author":"Fried B.","year":"1996","unstructured":"B. Fried , A. Lowry , and M. Stanley . \" BigDog: Hierarchical Authentication, Session Control, and Authorization for the Web \". USENIX Second Workshop on Electronic Commerce , Nov. 1996 . B. Fried, A. Lowry, and M. Stanley. \"BigDog: Hierarchical Authentication, Session Control, and Authorization for the Web\". USENIX Second Workshop on Electronic Commerce, Nov. 1996."},{"key":"e_1_3_2_1_16_1","first-page":"305","volume-title":"Proceedings of the National Computer Security Conference","author":"Gasser M.","year":"1989","unstructured":"M. Gasser , A. Goldstein , C. Kaufman , and B. Lampson . The Digital Distributed System Security Architecture . In Proceedings of the National Computer Security Conference , pp. 305 -- 319 , 1989 M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital Distributed System Security Architecture. In Proceedings of the National Computer Security Conference, pp. 305--319, 1989"},{"key":"e_1_3_2_1_17_1","volume-title":"Inside Java 2 Platform Security","author":"Gong L.","year":"2003","unstructured":"L. Gong , G. Ellison , M. Dageforde . Inside Java 2 Platform Security , Second Edition. Addison-Wesley (May 2003 ). L. Gong, G. Ellison, M. Dageforde. Inside Java 2 Platform Security, Second Edition. Addison-Wesley (May 2003)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273032"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945452"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10591"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_24_1","unstructured":"Microsoft Corporation. Assembly Manifest. .NET Framework Development Guide. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/cpguide\/html\/cpconAssemblyManifest.asp.  Microsoft Corporation. Assembly Manifest. .NET Framework Development Guide. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/cpguide\/html\/cpconAssemblyManifest.asp."},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft Corporation. Client Impersonation. Win32 and COM Development. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/secauthz\/security\/client_impersonation.asp.  Microsoft Corporation. Client Impersonation. Win32 and COM Development. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/secauthz\/security\/client_impersonation.asp."},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft Corporation. Strong Named Assemblies. .NET Framework Development Guide. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/cpguide\/html\/cpconStrong-NamedAssemblies.asp.  Microsoft Corporation. Strong Named Assemblies. .NET Framework Development Guide. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/cpguide\/html\/cpconStrong-NamedAssemblies.asp."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1118613"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581273"},{"key":"e_1_3_2_1_30_1","volume-title":"August","author":"The Open Group","year":"1997","unstructured":"The Open Group . DCE 1.1 : Authentication and Security. Catalog number C311 , August 1997 . http:\/\/www.opengroup.org\/pubs\/catalog\/c311.htm. The Open Group. DCE 1.1: Authentication and Security. Catalog number C311, August 1997. http:\/\/www.opengroup.org\/pubs\/catalog\/c311.htm."},{"key":"e_1_3_2_1_31_1","unstructured":"Trusted Computing Group. Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM.  Trusted Computing Group. Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363520"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/174613.174614"}],"event":{"name":"EuroSys07: Eurosys 2007 Conference","location":"Lisbon Portugal","acronym":"EuroSys07","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 2nd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2007"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272996.1273033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1272996.1273033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:47:36Z","timestamp":1750243656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272996.1273033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,21]]},"references-count":31,"alternative-id":["10.1145\/1272996.1273033","10.1145\/1272996"],"URL":"https:\/\/doi.org\/10.1145\/1272996.1273033","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1272998.1273033","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,3,21]]},"assertion":[{"value":"2007-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}