{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:40:08Z","timestamp":1750207208563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:00:00Z","timestamp":1559001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1241768,1637291"],"award-info":[{"award-number":["1241768,1637291"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,28]]},"DOI":"10.1145\/3322431.3325414","type":"proceedings-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:37:16Z","timestamp":1559306236000},"page":"207-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CMCAP"],"prefix":"10.1145","author":[{"given":"Theogene Hakiza","family":"Bucuti","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Kirill","family":"Morozov","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950194"},{"key":"e_1_3_2_1_2_1","first-page":"148","article-title":"Paranoid Penguin: An Introduction to Novell AppArmor","volume":"2006","author":"Bauer Mick","year":"2006","unstructured":"Mick Bauer . 2006 . Paranoid Penguin: An Introduction to Novell AppArmor . Linux J. , Vol. 2006 , 148 (Aug. 2006), 13--. http:\/\/dl.acm.org\/citation.cfm?id=1149826.1149839 Mick Bauer. 2006. Paranoid Penguin: An Introduction to Novell AppArmor. Linux J. , Vol. 2006, 148 (Aug. 2006), 13--. http:\/\/dl.acm.org\/citation.cfm?id=1149826.1149839","journal-title":"Linux J."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455818"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_22"},{"volume-title":"Software Engineering and Formal Methods ,","author":"Georget Laurent","key":"e_1_3_2_1_5_1","unstructured":"Laurent Georget , Mathieu Jaume , Guillaume Piolle , Fr\u00e9d\u00e9ric Tronel , and Val\u00e9rie Viet Triem Tong . 2017. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory . In Software Engineering and Formal Methods , , Alessandro Cimatti and Marjan Sirjani (Eds.). Springer International Publishing , Cham , 1--16. Laurent Georget, Mathieu Jaume, Guillaume Piolle, Fr\u00e9d\u00e9ric Tronel, and Val\u00e9rie Viet Triem Tong. 2017. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory. In Software Engineering and Formal Methods , , Alessandro Cimatti and Marjan Sirjani (Eds.). Springer International Publishing, Cham, 1--16."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Laurent Georget Mathieu Jaume Fr\u00e9d\u00e9ric Tronel Guillaume Piolle and Val\u00e9rie Viet Triem Tong. 2017. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux. In 2017 IEEE\/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE). 10--16.   Laurent Georget Mathieu Jaume Fr\u00e9d\u00e9ric Tronel Guillaume Piolle and Val\u00e9rie Viet Triem Tong. 2017. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux. In 2017 IEEE\/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE). 10--16.","DOI":"10.1109\/FormaliSE.2017.1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.11"},{"volume-title":"Response: bridging the link between intrusion detection alerts and security policies. Advances in Information Security","author":"Nora Cuppens-Boulahia Herv\u00e9 Fr\u00e9d\u00e9ric Cuppens","key":"e_1_3_2_1_8_1","unstructured":"Fr\u00e9d\u00e9ric Cuppens Nora Cuppens-Boulahia Herv\u00e9 Debar, Yohann Thomas . 2008. Response: bridging the link between intrusion detection alerts and security policies. Advances in Information Security , Vol. 38 . Springer-Verlag , New York, NY . Fr\u00e9d\u00e9ric Cuppens Nora Cuppens-Boulahia Herv\u00e9 Debar, Yohann Thomas. 2008. Response: bridging the link between intrusion detection alerts and security policies. Advances in Information Security, Vol. 38. Springer-Verlag, New York, NY."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805982"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294293"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998454"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180337.1180343"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542484"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 19th USENIX Security Symposium . http:\/\/www.cl.cam.ac.uk\/research\/security\/capsicum\/papers\/2010usenix-security-capsicum-website.pdf","author":"Watson Robert N. M.","year":"2010","unstructured":"Robert N. M. Watson , Jonathan Anderson , Ben Laurie , and Kris Kennaway . 2010 . Capsicum: practical capabilities for UNIX . In Proceedings of the 19th USENIX Security Symposium . http:\/\/www.cl.cam.ac.uk\/research\/security\/capsicum\/papers\/2010usenix-security-capsicum-website.pdf Robert N. M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. 2010. Capsicum: practical capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium . http:\/\/www.cl.cam.ac.uk\/research\/security\/capsicum\/papers\/2010usenix-security-capsicum-website.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 11th USENIX Security Symposium. USENIX Association","author":"Wright Chris","year":"2002","unstructured":"Chris Wright , Crispin Cowan , Stephen Smalley , James Morris , and Greg Kroah-Hartman . 2002 . Linux Security Modules: General Security Support for the Linux Kernel . In Proceedings of the 11th USENIX Security Symposium. USENIX Association , Berkeley, CA, USA, 17--31. http:\/\/dl.acm.org\/citation.cfm?id=647253.7 20287 Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. 2002. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 17--31. http:\/\/dl.acm.org\/citation.cfm?id=647253.720287"}],"event":{"name":"SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto ON Canada","acronym":"SACMAT '19"},"container-title":["Proceedings of the 24th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322431.3325414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322431.3325414","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322431.3325414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:27Z","timestamp":1750206327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322431.3325414"}},"subtitle":["Ephemeral Sandboxes for Adaptive Access Control"],"short-title":[],"issued":{"date-parts":[[2019,5,28]]},"references-count":15,"alternative-id":["10.1145\/3322431.3325414","10.1145\/3322431"],"URL":"https:\/\/doi.org\/10.1145\/3322431.3325414","relation":{},"subject":[],"published":{"date-parts":[[2019,5,28]]},"assertion":[{"value":"2019-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}