Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop 2012
DOI: 10.1145/2381913.2381931
|View full text |Cite
|
Sign up to set email alerts
|

CloudFilter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…As detailed in Section 6.2, further models and implementations for cross-system data flow tracking and policy propagation exist [53,89,161,162,220,222,224].…”
Section: Generic Cross System Data Flow Tracking and Policy Propagationmentioning
confidence: 99%
See 4 more Smart Citations
“…As detailed in Section 6.2, further models and implementations for cross-system data flow tracking and policy propagation exist [53,89,161,162,220,222,224].…”
Section: Generic Cross System Data Flow Tracking and Policy Propagationmentioning
confidence: 99%
“…For this reason, all of these solutions come with one more limitations when considered in the context of distributed data usage control enforcement, such as (i) being limited in the number of distinct data and/or policies that can be tracked [162,220,224], (ii) being limited to the propaga- tion of simple labels rather than complex policies [53,162,220,222,223], (iii) relying on particular hardware [162,220], hypervisors [223], and/or application(-protocol)s [89,161], (iv) necessitating the adaptation of existing applications [161,162,222].…”
Section: Generic Cross System Data Flow Tracking and Policy Propagationmentioning
confidence: 99%
See 3 more Smart Citations