نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2012
Toshihiro Yamauchi Kenji Yamamoto

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSs can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSs for Linux have been developed. In these OSs, different implementation methods have been adopted. However, there is no method for easily evaluating the perf...

Journal: :J. Comput. Syst. Sci. 2002
Steven Dawson Sabrina De Capitani di Vimercati Patrick Lincoln Pierangela Samarati

Despite advances in recent years in the area of mandatory access control in database systems, today’s information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive information can be put at risk because of release of other (less sensitive) related information. The a...

1999
Steven Dawson Sabrina De Capitani di Vimercati Pierangela Samarati

Although mandatory access control in database systems has been extensively studied in recent years, and several models and systems have been proposed, capabilities for enforcement of mandatory constraints remain limited. Lack of support for expressing and combating inference channels that improperly leak protected information remains a major limitation in today’s multilevel systems. Moreover, t...

2002
Geetanjali Sampemane Prasad Naldurg Roy H. Campbell

Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates collaboration between users, and promotes greater levels of interaction between users and devices. An Active Space can be configured for different types of applications at different times. We present an access control syst...

2013
Grzebieta S. R. Olivier

Since the introduction of mandatory helmet legislation (MHL) in Australia, debate on the effect of MHL on cyclist head injuries has been ongoing. The debate sometimes revolves around the statistical methodology used to assess intervention effectiveness. Supporters of rescinding the MHL thereby encouraging cyclists to ride without helmets, regularly dismiss statistical evaluations as being flawe...

2001
Takefumi Onabuta Tadashi Inoue Midori Asaka

Research regarding intrusion detection systems (IDSs) has become more active with the recent increases in illegal accesses to computer systems. Many researchers focus only to the techniques or mechanisms for detecting intrusions automatically, without considering the security of IDSs themselves. When an intruder attacks and breaks into a system, he or she often deletes system logs and stops aud...

2003
Bingchen Li Wei Li Zhiwei Xu

The common Grid systems are running on the backbone of Internet. These high performance computing environment provide a high scalable, high reconstructive Grid services in a C/S mode, while more and more Grid applications require a P2P liked infrastructure for personal intercommunication, resources sharing and collaborative work. Personal Grid, we proposed in VEGA Grid project of ICT, would est...

2015
Stefan Heule Devon Rifkin Alejandro Russo Deian Stefan

Browser extensions are ubiquitous. Yet, in today’s browsers, extensions are the most dangerous code to user privacy. Extensions are third-party code, like web applications, but run with elevated privileges. Even worse, existing browser extension systems give users a false sense of security by considering extensions to be more trustworthy than web applications. This is because the user typically...

Journal: :CoRR 2009
Jean-François Lalande David Rodriguez Christian Toinard

This paper proposes to address new requirements of confidentiality, integrity and availability properties fitting to peer-to-peer domains of resources. The enforcement of security properties in an open peer-topeer network remains an open problem as the literature have mainly proposed contribution on availability of resources and anonymity of users. That paper proposes a novel architecture that ...

2006
Anh-Quynh Nguyen Ruo Ando Yoshiyasu Takefuji

For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems from being misused. Unfortunately, MAC is still not widely deployed because of its complexity. The problem is even worse in a virtual machine environment, because the current architecture is not designed to support MAC in a site-wide manner: machines with multiple vir...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید