Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,580,602 papers from all fields of science
Search
Sign In
Create Free Account
Reference monitor
In operating systems architecture a reference monitor concept defines a set of design requirements on a reference validation mechanism, which…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Computer security
Language-based security
Local Procedure Call
Operating system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Mandatory Access Control for the Android Dalvik Virtual Machine
Aline Bousquet
,
Jérémy Briffaut
,
Laurent Clevy
,
C. Toinard
,
Benjamin Venelle
ESOS
2013
Corpus ID: 15156426
With the growing use of smartphones and other mobile devices, it becomes essential to be able to assure the user that his system…
Expand
2011
2011
Secure and Sustainable Benchmarking in Clouds
F. Kerschbaum
Business & Information Systems Engineering
2011
Corpus ID: 16969827
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This…
Expand
2011
2011
A reachability-based access control model for online social networks
T. Abdessalem
,
Imen Ben Dhia
ACM SIGMOD Workshop on Databases and Social…
2011
Corpus ID: 17857646
As a result of the widespread use of social networking sites, millions of individuals can today easily share personal and…
Expand
2009
2009
A usage control policy specification with Petri nets
Basel Katt
,
Xinwen Zhang
,
M. Hafner
International Conference on Collaborative…
2009
Corpus ID: 15081940
In this paper we propose a novel usage control policy specification based on Coloured Petri Nets formalism. Recently, usage…
Expand
2008
2008
Enforcing security properties in task-based systems
Keith Irwin
,
Ting Yu
,
W. Winsborough
ACM Symposium on Access Control Models and…
2008
Corpus ID: 1498154
Though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is…
Expand
2007
2007
Deriving Enforcement Mechanisms from Policies
H. Janicke
,
A. Cau
,
F. Siewe
,
H. Zedan
IEEE International Symposium on Policies for…
2007
Corpus ID: 1730267
Policies provide a flexible and scalable approach to the management of distributed systems by separating the specification of…
Expand
2003
2003
Modeling Dynamic Role-based Access Constraints using UML
K. Alghathbar
,
D. Wijesekera
2003
Corpus ID: 10369217
Systematic development of security sensitive software requires that there be a sufficiently expressive linguistic extension to…
Expand
1999
1999
Flexible Secure Multicasting in Active Networks
Zhaoyu Liu
,
R. Campbell
,
Sudha K. Varadarjan
,
P. Naldurg
,
Seung Yi
,
M. D. Mickunas
ICDCS Workshop on Group Communications and…
1999
Corpus ID: 9219349
In this paper we describe an alternative, flexible approach to multicast security in active networks. Traditional schemes for…
Expand
Review
1993
Review
1993
A survey of security issues in office computation and the application of secure computing models to office systems
R. Vaughn
,
H. Saiedian
,
E. A. Unger
Computers & security
1993
Corpus ID: 5488444
1988
1988
Element-level classification with A1 assurance
T. Lunt
,
D. Denning
,
R. Schell
,
M. Heckman
,
W. Shockley
Computers & security
1988
Corpus ID: 27312926
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE