Modeling the Trust Boundaries Created by Securable Objects
نویسنده
چکیده
Matt Miller presented his work on automatically discovering data flows between trust boundaries in the Microsoft Windows operating systems. Trust boundaries are divisions between privilege levels on a system (e.g., different user accounts or user versus administrator privileges). Discovering paths of data flow between privilege levels allows software auditors to audit only those sections of code where vulnerabilities might actually lead to privilege escalation attacks. Using Miller’s method, the auditor can quickly and automatically discern the relevant attack surface.
منابع مشابه
Analyzing Time-Decay Effects of Mediating-Objects in Creating Trust-Links
We address the problem of modeling trust network evolution through social communications among users in a social media site. In particular, we focus on a social trust-link created between two users having mediating-objects such as mediating-users and mediating-items, and analyze the time-decay effects of mediating-objects on social trust-link creation. To this end, we first introduce the basic ...
متن کاملNumerical Simulation of Flow Past Oscillating Airfoil Using Oscillation of Flow Boundary Condition
The present study is devoted to an approximate modeling for numerical simulation of flows past oscillating airfoils. In this study, it is shown that the harmonic oscillating objects can be studied by simple numerical codes that are not able to solve moving grids. Instead of using moving grid for the simulation of flowfield around an oscillating airfoil, this unsteady flow is solved on a fixed g...
متن کاملTrust Within and Across Boundaries: Conceptual Challenges and Empirical Insights Title: Making Sense of Trust Within and Across Boundaries Authors:
Recent calls have been placed for researchers to consider trust within wider theoretical conceptualizations, and in doing so, undertake a ‘reality check’ on existing theories and established methods of empirical inquiry. We respond to this by analysing trust as a social construction created within unique socially constructed contexts, such as boundaries. Actors assign meaning to boundaries whic...
متن کاملA Platform for Credibility Model Based Trust Management on Cloud Service
Trust management is the main challenges in the cloud service environment. Trust management can be used to finding the securable service in the cloud environment. In this paper to focusing the trustable feedback analysis and also scalable analysis in both the consumer’s and provider privacy. Consumer privacy is not an easy goal for determining the information in both the trust management servers...
متن کاملStatistical Background Modeling Based on Velocity and Orientation of Moving Objects
Background modeling is an important step in moving object detection and tracking. In this paper, we propose a new statistical approach in which, a sequence of frames are selected according to velocity and direction of some moving objects and then an initial background is modeled, based on the detection of gray pixel's value changes. To have used this sequence of frames, no estimator or distribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008