REFERENCES
Abrams, M., Eggers, K., LaPadula, L., and Olson, I. (1990).
Generalized Framework for Access Control: An In-
formal Description. In Proceedings of NCSC.
Armando, A., Carbone, R., Costa, G., and Merlo, A. (2015).
Android Permissions Unleashed. In Proceedings of
IEEE CSF, pages 320–333. IEEE.
Badger, L., Sterne, D. F., Sherman, D. L., Walker, K. M.,
and Haghighat, S. A. (1996). A Domain and Type
Enforcement UNIX Prototype. Computing Systems,
9(1):47–83.
Belyaev, K. (2016). Linux Policy Machine (LPM)
– Managing the Application-Level OS Re-
source Control in the Linux Environment.
https://github.com/kirillbelyaev/tinypm/tree/LPM.
accessed 12-March-2016.
Belyaev, K. and Ray, I. (2015). Towards Efficient Dissem-
ination and Filtering of XML Data Streams. In Pro-
ceedings of IEEE DASC.
Cabri, G., Leonardi, L., and Zambonelli, F. (2000). XML
Dataspaces for Mobile Agent Coordination. In Pro-
ceedings of ACM SAC, pages 181–188. ACM.
Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.
(2011). Analyzing inter-application communication
in Android. In Proceedings of ACM MobiSys, pages
239–252. ACM.
Cremonini, M., Omicini, A., and Zambonelli, F. (2000).
Coordination and access control in open distributed
agent systems: The TuCSoN approach. In Coordina-
tion Languages and Models, pages 99–114. Springer.
Docker Developers (2016). What is Docker?
https://www.docker.com/what-docker/. accessed
12-March-2016.
Ferraiolo, D., Gavrila, S., and Jansen, W. (2014). On the
Unification of Access Control and Data Services. In
Proceedings of IEEE IRI, pages 450–457. IEEE.
Gelernter, D. (1985). Generative Communication in Linda.
ACM TOPLAS, 7(1):80–112.
GrSecurity Developers (2016). What is GrSecurity?
https://grsecurity.net. accessed 12-March-2016.
Hallyn, S. and Kearns, P. (2000). Domain and Type En-
forcement for Linux. In Proceedings of ALS, pages
247–260.
Hallyn, S. E. and Morgan, A. G. (2008). Linux Capabilities:
Making them Work. In Proceedings of OLS, page 163.
Havoc Pennington, Red Hat, I. (2016). D-Bus
Specification. https://dbus.freedesktop.org/doc/dbus-
specification.html. accessed 12-March-2016.
Johnson, M. K. and Troan, E. W. (2004). Linux Application
Development. Addison-Wesley Professional.
Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek,
M. F., Kohler, E., and Morris, R. (2007). Informa-
tion flow control for standard OS abstractions. ACM
SIGOPS OSR, 41(6):321–334.
LaPadula, L. (1995). Rule-Set Modeling of Trusted Com-
puter System. In M., A., S., J., and H., P., editors,
Information Security: An Integrated Collection of Es-
says. IEEE Computer Society Press.
Linux Developers (2016). Linux Program-
mer’s Manual. http://man7.org/linux/man-
pages/man7/capabilities.7.html. accessed 12-
March-2016.
Linux Programmer’s Manual (2016). LIBCAP Manual.
http://man7.org/linux/man-pages/man3/libcap.3.html.
accessed 12-March-2016.
Loscocco, P. (2001). Integrating Flexible Support for Secu-
rity Policies into the Linux Operating System. In Pro-
ceedings of USENIX ATC, FREENIX Track, page 29.
Manual, L. P. (2016). Kernel Namespaces.
http://man7.org/linux/man-pages/man7/namespaces.
7.html. accessed 12-March-2016.
Minsky, N. H., Minsky, Y. M., and Ungureanu, V. (2000).
Making Tuple Spaces Safe for Heterogeneous Dis-
tributed Systems. In Proceedings of ACM SAC, pages
218–226.
Minsky, N. H. and Ungureanu, V. (1998). Unified support
for heterogeneous security policies in distributed sys-
tems. In Proc. of USENIX SS, pages 131–142.
n–Logic Ltd. (2016). n-Logic Web Caching Service
Provider. http://n-logic.weebly.com/. accessed 12-
March-2016.
Ott, A. and Fischer-H
¨
ubner, S. (2001). The Rule Set Based
Access Control (RSBAC) Framework for Linux. In
Proceedings of ILK.
Singh, J., Bacon, J., and Eyers, D. (2014). Policy enforce-
ment within emerging distributed, event-based sys-
tems. In Proceedings of ACM DEBS, pages 246–255.
ACM.
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Ander-
sen, D., and Lepreau, J. (1999). The Flask Security
Architecture: System Support for Diverse Security
Policies. In Proceedings of USENIX SS.
Vitek, J., Bryce, C., and Oriol, M. (2003). Coordinating
Processes with Secure Spaces. Science of Computer
Programming, 46(1):163–193.
Wright, C., Cowan, C., Smalley, S., Morris, J., and Kroah-
Hartman, G. (2002). Linux Security Modules: Gen-
eral security support for the Linux kernel. In Proceed-
ings of USENIX SS, pages 17–31.
Xu, Y., Dunn, A. M., Hofmann, O. S., Lee, M. Z., Mehdi,
S. A., and Witchel, E. (2014). Application-Defined
Decentralized Access Control. In Proceedings of
USENIX ATC, pages 395–408.
SECRYPT 2016 - International Conference on Security and Cryptography
182