{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:02:33Z","timestamp":1742385753380,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/sp.2007.10","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:17:58Z","timestamp":1181236678000},"page":"149-163","source":"Crossref","is-referenced-by-count":32,"title":["Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model"],"prefix":"10.1109","author":[{"given":"Marco","family":"Pistoia","sequence":"first","affiliation":[]},{"given":"Anindya","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"David A.","family":"Naumann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512531"},{"key":"36","article-title":"Detecting Format String Vulnerabilities with Type Qualifiers","author":"shankar","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503301"},{"key":"33","first-page":"362","article-title":"Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection","author":"pistoia","year":"2005","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"year":"0","key":"15"},{"key":"34","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/3-540-45309-1_3","article-title":"A Systematic Approach to Static Access Control","author":"pottier","year":"2001","journal-title":"Proc 10th European Symp Programming Languages and Systems"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/17.2.143"},{"year":"0","key":"39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"year":"0","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1178625.1178628"},{"key":"11","first-page":"131","article-title":"Checking for Race Conditions in File Accesses","volume":"9","author":"bishop","year":"1996","journal-title":"Computing Systems"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1981.10004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"20","article-title":"Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2","author":"gong","year":"1997","journal-title":"USENIX Symposium on Internet Technologies and Systems"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363520"},{"journal-title":"Programming perl","year":"2000","author":"wall","key":"42"},{"key":"41","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A Sound Type System for Secure Flow Analysis","volume":"4","author":"volpano","year":"1996","journal-title":"Journal of Computer Security"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.27"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674823"},{"key":"22","article-title":"Automata-based Confidentiality Monitoring","author":"guernic","year":"2006","journal-title":"Proceedings of 11th Annual Asian Computing Science Conference (ASIAN 2006)"},{"key":"23","article-title":"Information Flow Control for Java Based on Path Conditions in Dependence Graphs","author":"hammer","year":"2006","journal-title":"Proc IEEE Int'l Symp Secure Software Eng"},{"key":"24","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/54289.871709","article-title":"The Confused Deputy","volume":"22","author":"hardy","year":"1988","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766902"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/512927.512945"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"28","article-title":"Finding Security Vulnerabilities in Java Applications with Static Analysis","author":"livshits","year":"2005","journal-title":"Proceedings of the 14th USENIX Security Symposium"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"journal-title":"Program","year":"1994","author":"andersen","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310732"},{"key":"1","article-title":"Access Control Based on Execution History","author":"abadi","year":"2003","journal-title":"Proc Symp Netw Distrib Syst Security (NDSS 2003)"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/11541868_14"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.13"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796804005453"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30569-9_2"},{"key":"31","article-title":"Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software","author":"newsome","year":"2005","journal-title":"Proceedings of the 2004 Symposium on Network and Distributed Systems Security (NDSS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004368"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1040294.1040304"}],"event":{"name":"2007 IEEE Symposium on Security and Privacy (SP '07)","start":{"date-parts":[[2007,5,20]]},"location":"Berkeley, CA","end":{"date-parts":[[2007,5,23]]}},"container-title":["2007 IEEE Symposium on Security and Privacy (SP '07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4223200\/4223201\/04223221.pdf?arnumber=4223221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:55:00Z","timestamp":1556470500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4223221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/sp.2007.10","relation":{},"subject":[],"published":{"date-parts":[[2007,5]]}}}