{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779065,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314466.1314472","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Protecting users from \"themselves\""],"prefix":"10.1145","author":[{"given":"William","family":"Enck","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Sandra","family":"Rueda","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Joshua","family":"Schiffman","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Yogesh","family":"Sreenivasan","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Luke","family":"St. Clair","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"TrustedBSD. http:\/\/www.trustedbsd.org.  TrustedBSD. http:\/\/www.trustedbsd.org."},{"key":"e_1_3_2_1_2_1","first-page":"165","volume-title":"Proceedings of the USENIX Technical Conference","author":"Berman Andrew","year":"1995","unstructured":"Andrew Berman , Virgil Bourassa , and Erik Selberg . TRON : Process-specific file protection for the UNIX operating system . In Proceedings of the USENIX Technical Conference , pages 165 -- 175 , 1995 . Andrew Berman, Virgil Bourassa, and Erik Selberg. TRON: Process-specific file protection for the UNIX operating system. In Proceedings of the USENIX Technical Conference, pages 165--175, 1995."},{"key":"e_1_3_2_1_3_1","volume-title":"Bluebox: A policy-driven, host-based intrusion detection system","author":"Chari S.","year":"2003","unstructured":"S. Chari and P. Cheng . Bluebox: A policy-driven, host-based intrusion detection system , 2003 . S. Chari and P. Cheng. Bluebox: A policy-driven, host-based intrusion detection system, 2003."},{"key":"e_1_3_2_1_4_1","unstructured":"CollabNet. Subversion. http:\/\/subversion.tigris.org.  CollabNet. Subversion. http:\/\/subversion.tigris.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1045502.1045548"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143122"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266763"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 6th Usenix Security Symposium","author":"Goldberg Ian","year":"1996","unstructured":"Ian Goldberg , David Wagner , Randi Thomas , and Eric A. Brewer . A secure environment for untrusted helper applications . In Proceedings of the 6th Usenix Security Symposium , San Jose, CA, USA , 1996 . Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th Usenix Security Symposium, San Jose, CA, USA, 1996."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1994.367313"},{"key":"e_1_3_2_1_11_1","first-page":"275","volume-title":"Proceedings of the 1988 USENIX Summer Symposium","author":"Lai Nick","year":"1988","unstructured":"Nick Lai and Terence Gray . Strengthening discresionary access controls to inhibit trojan horses and computer viruses . In Proceedings of the 1988 USENIX Summer Symposium , pages 275 -- 286 , June 1988 . Nick Lai and Terence Gray. Strengthening discresionary access controls to inhibit trojan horses and computer viruses. In Proceedings of the 1988 USENIX Summer Symposium, pages 275--286, June 1988."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/www.lids.org, accessed","author":"Linux","year":"2007","unstructured":"Linux intrusion detection system (LIDS). http:\/\/www.lids.org, accessed January 2007 . Linux intrusion detection system (LIDS). http:\/\/www.lids.org, accessed January 2007."},{"key":"e_1_3_2_1_13_1","first-page":"73","volume-title":"McDaniel and Atul Prakash. Methods and Limitations of Security Policy Reconciliation. In 2002 IEEE Symposium on Security and Privacy","author":"Patrick","year":"2002","unstructured":"Patrick McDaniel and Atul Prakash. Methods and Limitations of Security Policy Reconciliation. In 2002 IEEE Symposium on Security and Privacy , pages 73 -- 87 . IEEE Computer Society Press , May 2002 . Oakland, CA. Patrick McDaniel and Atul Prakash. Methods and Limitations of Security Policy Reconciliation. In 2002 IEEE Symposium on Security and Privacy, pages 73--87. IEEE Computer Society Press, May 2002. Oakland, CA."},{"key":"e_1_3_2_1_14_1","unstructured":"National Security Agency. Security-enhanced Linux (SELinux). http:\/\/www.nsa.gov\/selinux.  National Security Agency. Security-enhanced Linux (SELinux). http:\/\/www.nsa.gov\/selinux."},{"key":"e_1_3_2_1_15_1","unstructured":"Novell. AppArmor application security for linux. http:\/\/ www.novell.com\/linux\/security\/apparmor\/ accessed December 2006.  Novell. AppArmor application security for linux. http:\/\/ www.novell.com\/linux\/security\/apparmor\/ accessed December 2006."},{"key":"e_1_3_2_1_16_1","first-page":"6","volume":"5","author":"Ritchie D. M.","unstructured":"D. M. Ritchie and K. Thompson . The UNIX time-sharing system. The Bell System Technical Journal , 5 7( 6 (part 2)):1905+, 1978. D. M. Ritchie and K. Thompson. The UNIX time-sharing system. The Bell System Technical Journal, 57(6 (part 2)):1905+, 1978.","journal-title":"The Bell System Technical Journal"},{"key":"e_1_3_2_1_18_1","volume-title":"HP Laboratories Palo Alto","author":"Stiegler Marc","year":"2004","unstructured":"Marc Stiegler , Alan Karp , Ka-Ping Yee , and Mark Miller . Polaris : Virus safe computing for windows xp. Technical report , HP Laboratories Palo Alto , 2004 . Marc Stiegler, Alan Karp, Ka-Ping Yee, and Mark Miller. Polaris: Virus safe computing for windows xp. Technical report, HP Laboratories Palo Alto, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"Distributed Systems: Principles and Paradigms","author":"Tanenbaum A.","year":"2002","unstructured":"A. Tanenbaum and M. Steen . Distributed Systems: Principles and Paradigms . Prentice Hall , 2002 . A. Tanenbaum and M. Steen. Distributed Systems: Principles and Paradigms. Prentice Hall, 2002."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Computer security architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314466.1314472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314466.1314472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314466.1314472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":17,"alternative-id":["10.1145\/1314466.1314472","10.1145\/1314466"],"URL":"https:\/\/doi.org\/10.1145\/1314466.1314472","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}