{"id":"https://openalex.org/W2218405197","doi":"https://doi.org/10.3233/jcs-150541","title":"Secure multi-execution: Fine-grained, declassification-aware, and transparent","display_name":"Secure multi-execution: Fine-grained, declassification-aware, and transparent","publication_year":2015,"publication_date":"2015-12-28","ids":{"openalex":"https://openalex.org/W2218405197","doi":"https://doi.org/10.3233/jcs-150541","mag":"2218405197"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-150541","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150541","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086787088","display_name":"Willard Rafnsson","orcid":"https://orcid.org/0000-0003-1482-3094"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Willard Rafnsson","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070340953","display_name":"Andrei Sabelfeld","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andrei Sabelfeld","raw_affiliation_strings":["Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086787088"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":3.0201,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.92735082,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"24","issue":"1","first_page":"39","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8874586820602417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6067512631416321},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4747866988182068},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.4154275059700012},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1866791844367981},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.18559885025024414},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1615648865699768}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8874586820602417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6067512631416321},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4747866988182068},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.4154275059700012},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1866791844367981},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.18559885025024414},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1615648865699768}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-150541","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150541","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:research.chalmers.se:236135","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/236135","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W105715719","https://openalex.org/W1265250368","https://openalex.org/W1499226144","https://openalex.org/W1503761302","https://openalex.org/W1504880723","https://openalex.org/W1534212008","https://openalex.org/W1572388405","https://openalex.org/W1597778235","https://openalex.org/W1699577049","https://openalex.org/W1725973462","https://openalex.org/W1819958245","https://openalex.org/W1920159904","https://openalex.org/W1957951093","https://openalex.org/W1972999341","https://openalex.org/W1977764760","https://openalex.org/W1994197051","https://openalex.org/W1995290095","https://openalex.org/W1997775274","https://openalex.org/W1997988349","https://openalex.org/W2008332764","https://openalex.org/W2027146564","https://openalex.org/W2027822753","https://openalex.org/W2066195326","https://openalex.org/W2071700915","https://openalex.org/W2081377878","https://openalex.org/W2085939020","https://openalex.org/W2094873755","https://openalex.org/W2097833793","https://openalex.org/W2101678831","https://openalex.org/W2103428609","https://openalex.org/W2106573617","https://openalex.org/W2109332509","https://openalex.org/W2110904621","https://openalex.org/W2111794592","https://openalex.org/W2116807588","https://openalex.org/W2122049982","https://openalex.org/W2126469755","https://openalex.org/W2128282420","https://openalex.org/W2136887296","https://openalex.org/W2139093088","https://openalex.org/W2149854126","https://openalex.org/W2150174204","https://openalex.org/W2153684747","https://openalex.org/W2162755110","https://openalex.org/W2165078378","https://openalex.org/W2166542433","https://openalex.org/W2167004108","https://openalex.org/W2171239903","https://openalex.org/W2295903522","https://openalex.org/W2296605318","https://openalex.org/W3009776881","https://openalex.org/W4206358530","https://openalex.org/W4230988461","https://openalex.org/W4243963980"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4382930947","https://openalex.org/W3152382318","https://openalex.org/W3004686567","https://openalex.org/W2738656338","https://openalex.org/W2603787370","https://openalex.org/W2555400967","https://openalex.org/W3214759741","https://openalex.org/W3081288631","https://openalex.org/W4254979619"],"abstract_inverted_index":{"Recently,":[0],"much":[1],"progress":[2],"has":[3],"been":[4],"made":[5],"on":[6,124,140],"achieving":[7],"information-flow":[8],"security":[9,24,35,151],"via":[10],"secure":[11,87,90,111,121,146,166,191,201,216],"multi-execution.":[12,112,217],"Secure":[13,61],"multi-execution":[14,62,91,122,147,167,192],"([Formula:":[15],"see":[16],"text])":[17],"is":[18,50,86,133,208],"an":[19,44],"elegant":[20],"way":[21],"to":[22,74,136,148],"enforce":[23],"by":[25],"executing":[26],"a":[27,47,84,162,185,209],"given":[28,48],"program":[29,85],"multiple":[30],"times,":[31],"once":[32],"for":[33,52,55,165,212],"each":[34],"level,":[36],"while":[37],"carefully":[38],"dispatching":[39],"inputs":[40,73],"and":[41,77,139,155,176],"ensuring":[42],"that":[43,59,82,168,205],"execution":[45],"at":[46,58],"level":[49],"responsible":[51],"producing":[53],"outputs":[54],"information":[56,172],"sinks":[57],"level.":[60],"guarantees":[63],"noninterference,":[64],"in":[65,79,200],"the":[66,80,103,116,119,125,128,195],"sense":[67,81],"of":[68,96,105,127,153,157,198],"no":[69],"dependencies":[70],"from":[71,118],"secret":[72],"public":[75],"outputs,":[76],"transparency,":[78],"if":[83],"then":[88],"its":[89,97],"does":[92],"not":[93],"disable":[94],"any":[95],"original":[98,120,196],"behavior.":[99],"This":[100],"paper":[101],"pushes":[102],"boundary":[104],"what":[106,171],"can":[107,173,179,193],"be":[108,137,174,180],"achieved":[109],"with":[110,215],"First,":[113],"we":[114,144,160,183],"lift":[115],"assumption":[117],"work":[123],"totality":[126],"input":[129],"environment":[130],"(that":[131],"there":[132],"always":[134],"assumed":[135],"input)":[138],"cooperative":[141],"scheduling.":[142],"Second,":[143],"generalize":[145],"distinguish":[149],"between":[150],"levels":[152],"presence":[154],"content":[156],"messages.":[158],"Third,":[159],"introduce":[161],"declassification":[163],"model":[164],"allows":[169],"expressing":[170],"released":[175],"where":[177],"it":[178],"released.":[181],"Fourth,":[182],"establish":[184],"full":[186,206],"transparency":[187,207],"result":[188],"showing":[189],"how":[190],"preserve":[194],"order":[197],"messages":[199],"programs.":[202],"We":[203],"demonstrate":[204],"key":[210],"enabler":[211],"discovering":[213],"attacks":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
