FlowK: Information Flow Control for the Cloud, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, 2014. ,
DOI : 10.1109/CloudCom.2014.11
Information Flow Control for Strong Protection with Flexible Sharing in PaaS, 2015 IEEE International Conference on Cloud Engineering, 2015. ,
DOI : 10.1109/IC2E.2015.64
Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control, 2015 IEEE International Conference on Cloud Engineering, 2015. ,
DOI : 10.1109/IC2E.2015.71
Policy, legal and regulatory implications of a Europe-only cloud, International Journal of Law and Information Technology, vol.24, issue.3, p.6, 2014. ,
DOI : 10.1093/ijlit/eaw006
Information Flow Control for a Medical Web Portal, 2013. ,
A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002. ,
DOI : 10.1145/581271.581276
On middleware for emerging health services, Journal of Internet Services and Applications, vol.5, issue.1, pp.1-34, 2014. ,
DOI : 10.1136/jamia.1997.0040238
URL : http://doi.org/10.1186/1869-0238-5-6
Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, 2011. ,
DOI : 10.1109/MC.2011.225
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Secure Computer Systems: Mathematical Foundations and Model, The MITRE Corp, pp.74-244, 1973. ,
Integrity Considerations for Secure Computer Systems, MITRE Corp, 1977. ,
A Decentralized Model for Information Flow Control, 17th Symposium on Operating Systems Principles (SOSP), pp.129-142, 1997. ,
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
Information Flow Control for Secure Cloud Computing, IEEE Transactions on Network and Service Management, vol.11, issue.1, pp.76-89, 2014. ,
DOI : 10.1109/TNSM.2013.122313.130423
Rule-Based Run-Time Information Flow Control in Service Cloud, 2011 IEEE International Conference on Web Services, pp.524-531, 2011. ,
DOI : 10.1109/ICWS.2011.35
Airavat: Security and Privacy for MapReduce, 7th Symposium on Networked System Design and Implementation. USENIX, pp.297-312, 2010. ,
MrLazy: Lazy Runtime Label Propagation for MapReduce, 6th Workshop on Hot Topics in Cloud Computing (HotCloud). USENIX, 2014. ,
Information flow control for stream processing in clouds, Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pp.89-100, 2013. ,
DOI : 10.1145/2462410.2463205
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.753-760, 2014. ,
DOI : 10.1109/BDCloud.2014.89
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Role templates for content-based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.153-159, 1997. ,
DOI : 10.1145/266741.266773
Reconciling role based management and role based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.135-141, 1997. ,
DOI : 10.1145/266741.266770
IFDB, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13, pp.43-56, 2013. ,
DOI : 10.1145/2465351.2465357
Separation of Duties in Computerized Information Systems, Database Security IV: Status and Prospects, 1990. ,
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Dryad, ACM SIGOPS Operating Systems Review, vol.41, issue.3, pp.59-72, 2007. ,
DOI : 10.1145/1272998.1273005
Regional Clouds: Technical Considerations, 2014. ,
Integrating Messaging Middleware and Information Flow Control, 2015 IEEE International Conference on Cloud Engineering, 2015. ,
DOI : 10.1109/IC2E.2015.13
SeLINQ: Tracking Information Across Application-Database Boundaries, 19th SIGPLAN Conference on Functional Programming, pp.25-38, 2014. ,
FlowR, Proceedings of the 13th international conference on Modularity, MODULARITY '14, 2014. ,
DOI : 10.1145/2577080.2577090
URL : https://www.repository.cam.ac.uk/bitstream/1810/245999/1/OA719_p37-pasquier.pdf
Information Flow Control for Standard OS Abstractions, Symposium on Operating Systems Principles, pp.321-334, 2007. ,
Securing Distributed Systems with Information Flow Control, 5th USENIX Symposium on Networked System Design and Implementation, pp.293-308, 2008. ,
Network Information Flow Control: Proof of Concept, 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp.2957-2962, 2013. ,
DOI : 10.1109/SMC.2013.504
SilverLine, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, 2011. ,
DOI : 10.1145/2523649.2523663