{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:18Z","timestamp":1750307778703,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314466.1314475","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"54-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving multi-tier security using redundant authentication"],"prefix":"10.1145","author":[{"given":"Jodie P.","family":"Boyer","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ragib","family":"Hasan","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lars E.","family":"Olson","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Raila","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium","author":"Acharya A.","year":"2000","unstructured":"A. Acharya and M. Raje . MAPbox: Using parameterized behavior classes to con.ne untrusted applications . In USENIX Security Symposium , 2000 . A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to con.ne untrusted applications. In USENIX Security Symposium, 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security Sympoisum","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. Song . Privtrans: Automatically partitioning programs for privilege separation . In USENIX Security Sympoisum , Aug. 2004 . D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Sympoisum, Aug. 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_4_1","volume-title":"December","author":"Ehrlich P.","year":"2006","unstructured":"P. Ehrlich and T. Considine (Chairs). Open Building Information Exchange (oBIX) version 1.0. OASIS Committee Speci.cation , December 2006 . http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=obix. P. Ehrlich and T. Considine (Chairs). Open Building Information Exchange (oBIX) version 1.0. OASIS Committee Speci.cation, December 2006. http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=obix."},{"key":"e_1_3_2_1_5_1","volume-title":"Network and Distributed System Security Symposium","author":"Garfinkel T.","year":"2004","unstructured":"T. Garfinkel , B. Pfa ., and M. Rosenblum . Ostia: A delegating architecture for secure system call interposition . In Network and Distributed System Security Symposium , 2004 . T. Garfinkel, B. Pfa., and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Network and Distributed System Security Symposium, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","author":"Goldberg I.","year":"1996","unstructured":"I. Goldberg , D. Wagner , R. Thomas , and E. Brewer . A secure environment for untrusted helper applications . In USENIX Security Symposium , July 1996 . I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In USENIX Security Symposium, July 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"e_1_3_2_1_8_1","unstructured":"Java. http:\/\/java.sun.com\/.  Java. http:\/\/java.sun.com\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Web Page","author":"Kubaitis E.","year":"2000","unstructured":"E. Kubaitis . Bluestem overview . Web Page , August 2000 . https:\/\/www-s4.uiuc.edu\/bluestem-notes\/. E. Kubaitis. Bluestem overview. Web Page, August 2000. https:\/\/www-s4.uiuc.edu\/bluestem-notes\/."},{"key":"e_1_3_2_1_10_1","volume-title":"February","author":"Lawrence K.","year":"2006","unstructured":"K. Lawrence and C. Kaler (Chairs). Web Services Security (WS-Security) X.509 Certificate Token profile 1.1. OASIS Standard Speci.cation , February 2006 . http:\/\/docs.oasis-open.org\/wss\/v1.1\/ wss-v1.1-spec-os-x509TokenProfile.pdf. K. Lawrence and C. Kaler (Chairs). Web Services Security (WS-Security) X.509 Certificate Token profile 1.1. OASIS Standard Speci.cation, February 2006. http:\/\/docs.oasis-open.org\/wss\/v1.1\/ wss-v1.1-spec-os-x509TokenProfile.pdf."},{"volume-title":"Janurary","year":"2005","key":"e_1_3_2_1_11_1","unstructured":"Microsoft. Active directory overview. Web Page , Janurary 2005 . http:\/\/technet2.microsoft.com\/windowsserver\/en\/library\/7c981583-cf41-4e6c-b1f6-5b8863475ede1033.mspx?mfr=true. Microsoft. Active directory overview. Web Page, Janurary 2005. http:\/\/technet2.microsoft.com\/windowsserver\/en\/library\/7c981583-cf41-4e6c-b1f6-5b8863475ede1033.mspx?mfr=true."},{"key":"e_1_3_2_1_12_1","volume-title":"OPC White Paper","author":"OPC Task Force","year":"1998","unstructured":"OPC Task Force . OPC overview . OPC White Paper , October 1998 . http:\/\/www.opcfoundation.org\/DownloadFile.aspx\/General\/OPC\\%20Overview\\%201.00.pdf?RI=1. OPC Task Force. OPC overview. OPC White Paper, October 1998. http:\/\/www.opcfoundation.org\/DownloadFile.aspx\/General\/OPC\\%20Overview\\%201.00.pdf?RI=1."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720286"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium","author":"Provos N.","year":"2003","unstructured":"N. Provos . Improving host security with system call policies . In USENIX Security Symposium , Aug. 2003 . N. Provos. Improving host security with system call policies. In USENIX Security Symposium, Aug. 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium","author":"Provos N.","year":"2003","unstructured":"N. Provos , M. Friedl , and P. Honeyman . Preventing privilege escalation . In USENIX Security Symposium , Washington, DC , Aug. 2003 . N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In USENIX Security Symposium, Washington, DC, Aug. 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"RSA Laboratories Technical Note","author":"Laboratories RSA","year":"1997","unstructured":"RSA Laboratories . Public-key cryptography standards (PKCS) #7: Cryptographic message syntax standard version 1.6 . RSA Laboratories Technical Note , May 1997 . http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2129. RSA Laboratories. Public-key cryptography standards (PKCS) #7: Cryptographic message syntax standard version 1.6. RSA Laboratories Technical Note, May 1997. http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2129."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_1_18_1","volume-title":"Liberty ID-FF architecture overview","author":"Wason T.","year":"2005","unstructured":"T. Wason , S. Cantor , J. Hodges , J. Kemp , and P. Thompson . Liberty ID-FF architecture overview , 2005 . T. Wason, S. Cantor, J. Hodges, J. Kemp, and P. Thompson. Liberty ID-FF architecture overview, 2005."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Computer security architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314466.1314475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314466.1314475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314466.1314475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":18,"alternative-id":["10.1145\/1314466.1314475","10.1145\/1314466"],"URL":"https:\/\/doi.org\/10.1145\/1314466.1314475","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}