{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:58Z","timestamp":1774946578670,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,15]],"date-time":"2009-06-15T00:00:00Z","timestamp":1245024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,15]]},"DOI":"10.1145\/1542476.1542484","type":"proceedings-article","created":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T09:34:36Z","timestamp":1245144876000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Laminar"],"prefix":"10.1145","author":[{"given":"Indrajit","family":"Roy","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Donald E.","family":"Porter","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Michael D.","family":"Bond","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Emmett","family":"Witchel","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DaCapo Benchmark Regression Tests. \\URLhttp:\/\/jikesrvm.anu.edu.au\/~dacapo\/.  DaCapo Benchmark Regression Tests. \\URLhttp:\/\/jikesrvm.anu.edu.au\/~dacapo\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0211"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455800"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029891"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_9_1","volume-title":"DOD 5200.28-STD (The Orange Book) edition","author":"Department of Defense.","year":"1985","unstructured":"Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria , DOD 5200.28-STD (The Orange Book) edition , December 1985 . Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition, December 1985."},{"key":"e_1_3_2_1_10_1","first-page":"205","volume-title":"From trusted to secure: Building and executing applications that enforce system security","author":"Hicks Boniface","year":"2007","unstructured":"Boniface Hicks , Sandra Rueda , Trent Jaeger , and Patrick McDaniel . From trusted to secure: Building and executing applications that enforce system security . pages 205 -- 218 , 2007 . Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel. From trusted to secure: Building and executing applications that enforce system security. pages 205--218, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.106971"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_14_1","volume-title":"Capability-Based Computer Systems","author":"Levy Henry M.","year":"1984","unstructured":"Henry M. Levy . Capability-Based Computer Systems . Digital Press , Bedford, Massachusetts , 1984 . Henry M. Levy. Capability-Based Computer Systems. Digital Press, Bedford, Massachusetts, 1984."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In USENIX , 2001 . P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX, 2001."},{"key":"e_1_3_2_1_16_1","volume-title":"Usenix","author":"McVoy Larry","year":"1996","unstructured":"Larry McVoy and Carl Staelin . lmbench : Portable tools for performance analysis . In Usenix , 1996 . Larry McVoy and Carl Staelin. lmbench: Portable tools for performance analysis. In Usenix, 1996."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_19_1","unstructured":"A. C. Myers N. Nystrom L. Zheng and S. Zdancewic. Jif: Java information flow. Software release. http:\/\/www.cs.cornell.edu\/jif July 2001.  A. C. Myers N. Nystrom L. Zheng and S. Zdancewic. Jif: Java information flow. Software release. http:\/\/www.cs.cornell.edu\/jif July 2001."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449780"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_1_23_1","first-page":"152","volume-title":"Proceedings of the first APPSEM--II workshop","author":"Simonet V.","year":"2003","unstructured":"V. Simonet and I. Rocquencourt . Flow Caml in a nutshell . In Proceedings of the first APPSEM--II workshop , pages 152 -- 165 , 2003 . V. Simonet and I. Rocquencourt. Flow Caml in a nutshell. In Proceedings of the first APPSEM--II workshop, pages 152--165, 2003."},{"key":"e_1_3_2_1_24_1","volume-title":"release 1.01 edition","author":"Standard Performance Evaluation Corporation","year":"2001","unstructured":"Standard Performance Evaluation Corporation . SPECjbb2000 Documentation , release 1.01 edition , 2001 . Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. K. Hartman . Linux security modules: General security support for the Linux kernel . In USENIX Security Symposium , 2002 . C. Wright, C. Cowan, S. Smalley, J. Morris, and G. K. Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security Symposium, 2002."},{"key":"e_1_3_2_1_28_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar . In OSDI , 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In OSDI, 2006."},{"key":"e_1_3_2_1_29_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , H. Kannan , M. Dalton , and C. Kozyrakis . Hardware enforcement of application security policies using tagged memory . In OSDI , 2008 . N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In OSDI, 2008."}],"event":{"name":"PLDI '09: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Dublin Ireland","acronym":"PLDI '09","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542484","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1542476.1542484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:56Z","timestamp":1750238996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542484"}},"subtitle":["practical fine-grained decentralized information flow control"],"short-title":[],"issued":{"date-parts":[[2009,6,15]]},"references-count":28,"alternative-id":["10.1145\/1542476.1542484","10.1145\/1542476"],"URL":"https:\/\/doi.org\/10.1145\/1542476.1542484","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1543135.1542484","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,6,15]]},"assertion":[{"value":"2009-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}