{"id":"https://openalex.org/W2129787457","doi":"https://doi.org/10.1145/1229285.1229304","title":"SecureBus","display_name":"SecureBus","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W2129787457","doi":"https://doi.org/10.1145/1229285.1229304","mag":"2129787457"},"language":"en","primary_location":{"id":"doi:10.1145/1229285.1229304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100711482","display_name":"Xinwen Zhang","orcid":"https://orcid.org/0000-0002-8321-3006"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinwen Zhang","raw_affiliation_strings":["George Mason University, Fairfax, Virginia","George Mason University, Fairfax, Virginia.#TAB#"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, Virginia","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"George Mason University, Fairfax, Virginia.#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015159925","display_name":"Michael J. Covington","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael J. Covington","raw_affiliation_strings":["Intel Corporation, Hillsboro, Oregon","[Intel Corporation, Hillsboro, Oregon]"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, Hillsboro, Oregon","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Corporation, Hillsboro, Oregon]","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065505890","display_name":"Songqing Chen","orcid":"https://orcid.org/0000-0003-4650-7125"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songqing Chen","raw_affiliation_strings":["George Mason University, Fairfax, Virginia","George Mason University, Fairfax, Virginia.#TAB#"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, Virginia","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"George Mason University, Fairfax, Virginia.#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038692973","display_name":"Ravi Sandhu","orcid":"https://orcid.org/0000-0002-3165-1813"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravi Sandhu","raw_affiliation_strings":["George Mason University and TriCipher Inc"],"affiliations":[{"raw_affiliation_string":"George Mason University and TriCipher Inc","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100711482"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":15.5478,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.98647831,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"117","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5230463743209839}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5230463743209839}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1229285.1229304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W36092891","https://openalex.org/W1481758559","https://openalex.org/W1482030462","https://openalex.org/W1539943797","https://openalex.org/W1544658515","https://openalex.org/W1559801425","https://openalex.org/W1844590493","https://openalex.org/W1972479252","https://openalex.org/W1993163335","https://openalex.org/W2007999111","https://openalex.org/W2040234252","https://openalex.org/W2093522256","https://openalex.org/W2105982560","https://openalex.org/W2111996486","https://openalex.org/W2115175416","https://openalex.org/W2144794336","https://openalex.org/W2150858564","https://openalex.org/W2156479376","https://openalex.org/W2162171351","https://openalex.org/W2166004296","https://openalex.org/W2168084064","https://openalex.org/W2168884369","https://openalex.org/W2914982603","https://openalex.org/W4206796831","https://openalex.org/W4237164190","https://openalex.org/W6676442086","https://openalex.org/W6683950259"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"The":[0],"increasing":[1],"number":[2],"of":[3,71,96,107,161],"software-based":[4],"attacks":[5],"has":[6],"attracted":[7],"substantial":[8],"efforts":[9],"to":[10,26,125,153,171],"prevent":[11],"applications":[12,49,109,148],"from":[13],"malicious":[14],"interference.":[15],"For":[16],"example,":[17],"Trusted":[18],"Computing":[19],"(TC)":[20],"technologies":[21],"have":[22,45,78,185],"been":[23],"recently":[24],"proposed":[25],"provide":[27,126],"strong":[28,82,127],"isolation":[29,83,128],"on":[30,69,191],"application":[31,55,143],"platforms.":[32],"On":[33],"the":[34,91,111,120,159],"other":[35],"hand,":[36],"today":[37],"pervasively":[38],"available":[39],"computing":[40],"cycles":[41],"and":[42,129,134,144,181],"data":[43],"resources":[44],"enabled":[46],"various":[47],"distributed":[48],"that":[50,198],"require":[51,104],"collaboration":[52,87],"among":[53],"different":[54],"processes.":[56],"These":[57],"two":[58,73],"conflicting":[59],"trends":[60],"grow":[61],"in":[62,90],"parallel.":[63],"While":[64],"much":[65],"existing":[66,147],"research":[67],"focuses":[68],"one":[70],"these":[72,97],"aspects,":[74],"a":[75,187],"few":[76],"authors":[77],"considered":[79],"simultaneously":[80],"providing":[81],"as":[84,86],"well":[85],"convenience,":[88],"particularly":[89],"TC":[92],"environment.":[93],"However,":[94],"none":[95],"schemes":[98],"is":[99,142,167],"transparent.":[100],"That":[101],"is,":[102],"they":[103],"modifications":[105],"either":[106],"legacy":[108,175],"or":[110],"underlying":[112],"Operating":[113],"System":[114],"(OS).In":[115],"this":[116],"paper,":[117],"we":[118,184],"propose":[119],"SecureBus":[121],"(SB)":[122],"architecture,":[123],"aiming":[124],"flexible":[130],"controlled":[131],"information":[132],"flow":[133],"communication":[135],"between":[136],"processes":[137],"at":[138],"runtime.":[139],"Since":[140],"SB":[141,157,199],"OS":[145],"transparent,":[146],"can":[149,200],"run":[150],"without":[151],"changes":[152],"commodity":[154],"OS's.":[155],"Furthermore,":[156],"enables":[158],"enforcement":[160],"general":[162],"access":[163],"control":[164],"policies,":[165],"which":[166],"required":[168],"but":[169],"difficult":[170],"achieve":[172,202],"for":[173],"typical":[174],"applications.":[176],"To":[177],"study":[178],"its":[179,203],"feasibility":[180],"performance":[182],"overhead,":[183],"implemented":[186],"prototype":[188],"system":[189],"based":[190],"User-Mode":[192],"Linux.":[193],"Our":[194],"experimental":[195],"results":[196],"show":[197],"effectively":[201],"design":[204],"goals.":[205]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
