نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2001
B. A. Peters J. S. Smith D. J. Medeiros Asa Elkins Jeffery W. Wilson Denis Gracanin

The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Distributed simulation introduces an information assurance challenge and details of a simulation must be guarded from unauthorized access. The High Level Architecture (HLA) and its Run-Time Interface (RTI) do not define ...

2007
Boniface Hicks Sandra Julieta Rueda Trent Jaeger Patrick D. McDaniel

Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections rely on restricting the flow of information between processes based on security levels. The problem is, there are many applications that defy simple classification by security level, some of them essential for system o...

2000
Paul C. Clark

Graduates from the various computer fields need to have a better education in the area of computer security problems and their solutions. In particular, there appears to be little exposure to the enforcement of non-discretionary or Mandatory Access Control (MAC) policies in automated systems. One cause of this deficiency is the expense, limited availability, and limited functionality of operati...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Flemming Nielson Hanne Riis Nielson

The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-free least fixed point logic one may use efficient algorithms for computing the least admissible solutions. We extend this scenario to validate the fulfilment of safety and security constraints on admissible solutions; the ...

Journal: :Computing Systems 1994
Leonard J. LaPadula

This article describes a rule-set approach to formal modeling of a trusted computer system. A finite state machine models the access operations of the trusted system while a separate rule set expresses the system's trust policies. A powerful feature of this approach is its ability to fit several widely differing trust policies easily within the same model. The paper shows how this approach to m...

1991
Sylvia L. Osborn

Database security is usually implemented in terms of access control. Mandatory security requires classi cation levels for objects and clearance levels for subjects. In Object Oriented Databases, all operations are invoked via message passing. Such operations belong to two categories: those that create new objects and those that do not. The security scheme must use di erent rules to handle the t...

2012
Yifei Li Steve Carr Jean Mayo Ching-Kuang Shene Chaoli Wang

This paper describes DTEvisual, a visualization system that leverages Domain Type Enforcement (DTE) for access control education. Domain Type Enforcement (DTE) is a powerful abstraction for teaching students about policy complexity and application of the principle of least privilege, mandatory access control and modern models of access control. DTEvisual facilitates graphical depiction, constru...

2013
Nirupama Talele Jason Teutsch Trent Jaeger Robert F. Erbacher

System administrators frequently use Intrusion Detection and Prevention Systems (IDPS) and host security mechanisms, such as firewalls and mandatory access control, to protect their hosts from remote adversaries. The usual techniques for placing network monitoring and intrusion prevention apparatuses in the network do not account for host flows and fail to defend against vulnerabilities resulti...

2012
Hua Wang

Database security is a discipline that seeks methods to protect data stored at DBMSs from intrusions, improper modifications, theft, and unauthorized disclosure of private information. This is realized through a set of security services, which meet the security requirements of both the system and the data sources. A number of different techniques and approaches has been developed to assure data...

2003
Beata Sarna-Starosta Scott D. Stoller

Security-Enhanced Linux (SELinux) extends Linux with a flexible mandatory access control mechanism that enforces security policies expressed in SELinux’s policy language. Determining whether a given policy meets a site’s high-level security goals can be difficult, due to the low-level nature of the policy language and the size and complexity of SELinux policies. We propose a logic-programming-b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید