{"id":"https://openalex.org/W2052812542","doi":"https://doi.org/10.1109/cts.2010.5478471","title":"A dynamic end-to-end security for coordinating multiple protections within a Linux desktop","display_name":"A dynamic end-to-end security for coordinating multiple protections within a Linux desktop","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2052812542","doi":"https://doi.org/10.1109/cts.2010.5478471","mag":"2052812542"},"language":"en","primary_location":{"id":"doi:10.1109/cts.2010.5478471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2010.5478471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Symposium on Collaborative Technologies and Systems","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022420632","display_name":"J\u00e9r\u00e9my Briffaut","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117273","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Art","ror":"https://ror.org/02kgft750","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210117273"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"J. Briffaut","raw_affiliation_strings":["LIFO, ENSI de Bourges, Bourges, France","ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France"],"affiliations":[{"raw_affiliation_string":"LIFO, ENSI de Bourges, Bourges, France","institution_ids":["https://openalex.org/I4210117273"]},{"raw_affiliation_string":"ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France","institution_ids":["https://openalex.org/I4210117273"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025433714","display_name":"Martin Peres","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117273","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Art","ror":"https://ror.org/02kgft750","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210117273"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"M. Peres","raw_affiliation_strings":["LIFO, ENSI de Bourges, Bourges, France","ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France"],"affiliations":[{"raw_affiliation_string":"LIFO, ENSI de Bourges, Bourges, France","institution_ids":["https://openalex.org/I4210117273"]},{"raw_affiliation_string":"ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France","institution_ids":["https://openalex.org/I4210117273"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064519167","display_name":"Christian Toinard","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117273","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Art","ror":"https://ror.org/02kgft750","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210117273"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"C. Toinard","raw_affiliation_strings":["LIFO, ENSI de Bourges, Bourges, France","ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France"],"affiliations":[{"raw_affiliation_string":"LIFO, ENSI de Bourges, Bourges, France","institution_ids":["https://openalex.org/I4210117273"]},{"raw_affiliation_string":"ENSI de Bourges - LIFO, 88 Boulevard Lahitolle, 18020 BOURGES CEDEX, France","institution_ids":["https://openalex.org/I4210117273"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022420632"],"corresponding_institution_ids":["https://openalex.org/I4210117273"],"apc_list":null,"apc_paid":null,"fwci":0.929,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80838914,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"0 307","issue":null,"first_page":"509","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.83400958776474},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.6034446954727173},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5916423797607422},{"id":"https://openalex.org/keywords/end-user","display_name":"End user","score":0.5574378371238708},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.5286562442779541},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5181918740272522},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.512967050075531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5087948441505432},{"id":"https://openalex.org/keywords/network-access-protection","display_name":"Network Access Protection","score":0.4819898009300232},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.45093852281570435},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.44698596000671387},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4107038974761963},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.3706119656562805},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.26782238483428955},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.16619879007339478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83400958776474},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.6034446954727173},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5916423797607422},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.5574378371238708},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.5286562442779541},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5181918740272522},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.512967050075531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5087948441505432},{"id":"https://openalex.org/C113725186","wikidata":"https://www.wikidata.org/wiki/Q1186962","display_name":"Network Access Protection","level":2,"score":0.4819898009300232},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.45093852281570435},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.44698596000671387},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4107038974761963},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3706119656562805},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26782238483428955},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.16619879007339478},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cts.2010.5478471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2010.5478471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Symposium on Collaborative Technologies and Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-00483076v1","is_oa":false,"landing_page_url":"https://hal.science/hal-00483076","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"The 2010 International Symposium on Collaborative Technologies and Systems (CTS 2010), May 2010, Chicago, United States. pp.509-515","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1977764760","https://openalex.org/W2056048738","https://openalex.org/W2068231562","https://openalex.org/W2125627330","https://openalex.org/W2126302952","https://openalex.org/W2132356618","https://openalex.org/W2150250501","https://openalex.org/W2152172333","https://openalex.org/W2170656934","https://openalex.org/W2174195065"],"related_works":["https://openalex.org/W62196793","https://openalex.org/W2156479376","https://openalex.org/W2107771906","https://openalex.org/W2169500810","https://openalex.org/W4281397170","https://openalex.org/W2360277604","https://openalex.org/W2373935157","https://openalex.org/W2086798669","https://openalex.org/W1708158340","https://openalex.org/W3036389147"],"abstract_inverted_index":{"Currently,":[0],"application":[1],"protection":[2,52,60,125,132],"models":[3],"are":[4,42,54,61,86,97],"mostly":[5],"static":[6],"and":[7,35,118],"independent.":[8],"It":[9],"means":[10],"that":[11,104,133,156],"the":[12,21,64,91,101,109,139,147,176],"applications":[13,41],"cannot":[14],"handle":[15],"multiple":[16,29,136,144],"domains":[17,30,145],"to":[18,46,72,116,128,168],"manage":[19],"accordingly":[20],"permissions":[22],"for":[23,99,146,173],"a":[24,33,74,80,130,152,171],"given":[25],"user":[26,49,148,177],"request.":[27],"Managing":[28],"is":[31,115],"becoming":[32],"more":[34,36],"common":[37],"issue":[38],"as":[39,68,90],"desktop":[40],"growing":[43],"in":[44,126],"complexity":[45],"provide":[47,79,129],"better-designed":[48],"interfaces.":[50],"Today,":[51],"systems":[53,58,78],"almost":[55],"everywhere.":[56],"Multiple":[57],"of":[59,108,124,161],"available":[62,88],"from":[63],"Linux":[65],"kernel":[66],"such":[67,89,170],"SELinux":[69],"or":[70],"PIGA-Protect":[71],"get":[73],"Mandatory":[75],"Protection.":[76],"Those":[77],"per-syscall":[81],"validation":[82],"process.":[83],"Network":[84],"protections":[85],"also":[87],"IPtables":[92],"firewalling":[93],"mechanism.":[94],"But,":[95],"solutions":[96],"missing":[98],"coordinating":[100],"various":[102],"mechanisms":[103],"protect":[105],"different":[106,122],"levels":[107,123],"global":[110],"information":[111],"system.":[112],"The":[113],"purpose":[114],"reuse":[117],"coordinate":[119],"efficiently":[120,175],"those":[121],"order":[127],"end-to-end":[131,154],"manages":[134],"dynamically":[135],"domains.":[137],"Thus,":[138],"same":[140],"host":[141],"can":[142],"support":[143],"requests":[149],"while":[150],"providing":[151],"transparent":[153],"security":[155],"protects":[157],"against":[158],"complex":[159],"scenarios":[160],"attack.":[162],"This":[163],"paper":[164],"describes":[165],"an":[166],"attempt":[167],"deliver":[169],"system":[172],"controlling":[174],"requests.":[178]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
