Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Reference monitor

In operating systems architecture a reference monitor concept defines a set of design requirements on a reference validation mechanism, which… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Software Defined Internet Exchange Points (SDXes) increase the flexibility of interdomain traffic delivery on the Internet. Yet… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
Is this relevant?
2011
2011
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In authorization, there is often a wish to shift the burden of proof to those making requests, since they may have more resources… Expand
Is this relevant?
2008
2008
Though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Coordination languages are often used to describe open ended systems. This makes it challenging to develop tools for guaranteeing… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper argues that Haigh and Young's definition of noninterference for intransitive security policies admits information… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
System call interposition allows the kernel security model to be extended. However, when combined with current operating systems… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2007
2007
Policies provide a flexible and scalable approach to the management of distributed systems by separating the specification of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Embedding security enforcement code into applications is an alternative to traditional security mechanisms. This dissertation… Expand
  • figure 1.2
  • figure 1.3
  • figure 1.5
  • figure 2.1
  • figure 2.2
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a… Expand
  • figure 1
  • figure 2
Is this relevant?