Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target files that are likely to contain important user data. Researchers have approached this problem by developing techniques for restricting access to resources on an application-by-application basis. These so-called “sandbox environments, ” though effective, are cumbersome and difficult to use. In this paper, we present a prototype Windows NT/2000 tool that addresses malicious software threats to user data by extending the existing set of file-access permissions. Management and configuration options make the tool unobtrusive and easy to use. We have conducted preliminary...
International audienceMalware remains the number one threat for individuals, enterprises, and govern...
The advancement of modern Operating Systems (OSs), and the popularity of personal computing devices ...
Inside this report, existing Mandatory Access Control (MAC) implementations are analyzed, with a str...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Sub-Operating Systems: A New Approach to Application Security Users regularly exchange apparently in...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Users commonly download, patch, and use applications such as email clients, office applications, and...
One of the most fundamental problems in computer security is protecting sensitive digital informatio...
File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s data rich world t...
Traditionally, computer security has focused on containing the effects of malicious users or malicio...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Abstract Access control mechanisms are widely used in multi-user IT systems where it is necessary to...
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and ...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Viruses, trojan horses, and other malware are a growing problem for computer users, but current tool...
International audienceMalware remains the number one threat for individuals, enterprises, and govern...
The advancement of modern Operating Systems (OSs), and the popularity of personal computing devices ...
Inside this report, existing Mandatory Access Control (MAC) implementations are analyzed, with a str...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Sub-Operating Systems: A New Approach to Application Security Users regularly exchange apparently in...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Users commonly download, patch, and use applications such as email clients, office applications, and...
One of the most fundamental problems in computer security is protecting sensitive digital informatio...
File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s data rich world t...
Traditionally, computer security has focused on containing the effects of malicious users or malicio...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Abstract Access control mechanisms are widely used in multi-user IT systems where it is necessary to...
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and ...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Viruses, trojan horses, and other malware are a growing problem for computer users, but current tool...
International audienceMalware remains the number one threat for individuals, enterprises, and govern...
The advancement of modern Operating Systems (OSs), and the popularity of personal computing devices ...
Inside this report, existing Mandatory Access Control (MAC) implementations are analyzed, with a str...