{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:18Z","timestamp":1750306878891,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:00:00Z","timestamp":1370995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,12]]},"DOI":"10.1145\/2462410.2462414","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An information flow control meta-model"],"prefix":"10.1145","author":[{"given":"Dennis","family":"Kafura","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Denis","family":"Gracanin","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Computer Security: Art and Science","author":"Bishop M.","year":"2003","unstructured":"M. Bishop , Computer Security: Art and Science . Boston, MA : Pearson Education , 2003 . M. Bishop, Computer Security: Art and Science. Boston, MA: Pearson Education, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"key":"e_1_3_2_1_3_1","volume-title":"Role Based Access Control,\" 15th National Computer Security Conference","author":"Ferraiolo D. F.","year":"1992","unstructured":"D. F. Ferraiolo and D. Kuhn , \" Role Based Access Control,\" 15th National Computer Security Conference , 1992 . D. F. Ferraiolo and D. Kuhn, \"Role Based Access Control,\" 15th National Computer Security Conference, 1992."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266748"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. K. Thomas and R. S. Sandhu \"Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management \" Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects 1998.   R. K. Thomas and R. S. Sandhu \"Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management \" Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects 1998.","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410235"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373259"},{"key":"e_1_3_2_1_11_1","first-page":"35","article-title":"CAMAC: A Context-Aware Mandatory Access Control Model","volume":"1","author":"Jafarian J. H.","year":"2009","unstructured":"J. H. Jafarian , and Amini, Morteza , \" CAMAC: A Context-Aware Mandatory Access Control Model ,\" ISeCure, The ISC International Journal of Information Security , vol. 1 , pp. 35 -- 54 , 2009 . J. H. Jafarian, and Amini, Morteza, \"CAMAC: A Context-Aware Mandatory Access Control Model,\" ISeCure, The ISC International Journal of Information Security, vol. 1, pp. 35--54, 2009.","journal-title":"ISeCure, The ISC International Journal of Information Security"},{"key":"e_1_3_2_1_12_1","volume-title":"Dresden","author":"Ni Q.","year":"2007","unstructured":"Q. Ni , D. Lin , E. Bertino , and J. Lobo , \" Conditional Privacy-Aware Role Based Access Control,\" 12th European Symposiun on Research in Computer Security (ESORICS 2007) , Dresden , Germany , 2007 . Q. Ni, D. Lin, E. Bertino, and J. Lobo, \"Conditional Privacy-Aware Role Based Access Control,\" 12th European Symposiun on Research in Computer Security (ESORICS 2007), Dresden, Germany, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377857"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542238"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809866"},{"key":"e_1_3_2_1_17_1","volume-title":"Making information flow explicit in HiStar,\" Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation -","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazieres , \" Making information flow explicit in HiStar,\" Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7 , Seattle , WA , 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres, \"Making information flow explicit in HiStar,\" Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7, Seattle, WA, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_19_1","volume-title":"BC","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth , \" TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,\" Proceedings of the 9th USENIX conference on Operating Systems Design and Implementation, Vancouver , BC , Canada , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, \"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,\" Proceedings of the 9th USENIX conference on Operating Systems Design and Implementation, Vancouver, BC, Canada, 2010."},{"key":"e_1_3_2_1_20_1","first-page":"355","volume-title":"Reliability and Security (ARES '09)","author":"Hyung Chan K.","year":"2009","unstructured":"K. Hyung Chan , A. D. Keromytis , M. Covington , and R. Sahita , \" Capturing Information Flow with Concatenated Dynamic Taint Analysis,\" in International Conference on Availability , Reliability and Security (ARES '09) , 2009 , pp. 355 -- 362 . K. Hyung Chan, A. D. Keromytis, M. Covington, and R. Sahita, \"Capturing Information Flow with Concatenated Dynamic Taint Analysis,\" in International Conference on Availability, Reliability and Security (ARES '09), 2009, pp. 355--362."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"e_1_3_2_1_23_1","volume-title":"Securing distributed systems with information flow control,\" Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , S. Boyd-Wickizer , and D. Mazieres , \" Securing distributed systems with information flow control,\" Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation , San Francisco , California , 2008 . N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres, \"Securing distributed systems with information flow control,\" Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, San Francisco, California, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_25_1","volume-title":"Doha","author":"Ayed S.","year":"2007","unstructured":"S. Ayed , N. Cuppens-Boulahia , and F. Cuppens , \" An integrated model for access control and information flow requirements,\" Proceedings of the 12th Asian Computing Science Conference on Advances in Computer Science: Computer and Network Security , Doha , Qatar , 2007 . S. Ayed, N. Cuppens-Boulahia, and F. Cuppens, \"An integrated model for access control and information flow requirements,\" Proceedings of the 12th Asian Computing Science Conference on Advances in Computer Science: Computer and Network Security, Doha, Qatar, 2007."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/353615.353622"},{"key":"e_1_3_2_1_27_1","unstructured":"U.S. Department of Defense \"Trusted Computer System Evaluation Criteria \" 1985 pp. 116.  U.S. Department of Defense \"Trusted Computer System Evaluation Criteria \" 1985 pp. 116."},{"key":"e_1_3_2_1_28_1","first-page":"0405","article-title":"MITRA: A Meta-Model for Information Flow in Trust and Reputation Architectures","volume":"1207","author":"Staab E.","year":"2012","unstructured":"E. Staab and G. Muller , \" MITRA: A Meta-Model for Information Flow in Trust and Reputation Architectures ,\" Computing Research Repository (CoRR) , vol. abs\/ 1207 . 0405 , 2012 2012. E. Staab and G. Muller, \"MITRA: A Meta-Model for Information Flow in Trust and Reputation Architectures,\" Computing Research Repository (CoRR), vol. abs\/1207.0405, 2012 2012.","journal-title":"Computing Research Repository (CoRR)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542484"},{"key":"e_1_3_2_1_33_1","volume-title":"USA","author":"Wu R.","year":"2010","unstructured":"R. Wu , G.-J. Ahn , H. Hu , and M. Singhal , \" Information Flow Control in Cloud Computing,\" The Fifth International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, IL , USA , 2010 . R. Wu, G.-J. Ahn, H. Hu, and M. Singhal, \"Information Flow Control in Cloud Computing,\" The Fifth International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, IL, USA, 2010."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706349"}],"event":{"name":"SACMAT '13: 18th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Amsterdam The Netherlands","acronym":"SACMAT '13"},"container-title":["Proceedings of the 18th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462410.2462414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:29Z","timestamp":1750234709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,12]]},"references-count":34,"alternative-id":["10.1145\/2462410.2462414","10.1145\/2462410"],"URL":"https:\/\/doi.org\/10.1145\/2462410.2462414","relation":{},"subject":[],"published":{"date-parts":[[2013,6,12]]},"assertion":[{"value":"2013-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}