Operating systems must be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide variety of real-world security poli-cies. Such flexibility requires controlling the propaga-tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac-cess rights. Previous systems are lacking in at least one of these areas. In this paper we present an operating system security architecture that solves these problems. Control over propagation is provided by ensuring that the security policy is consulted for every security deci-sion. This control is achieved without significant perfor-mance degradation through the use of a security decision caching mechanism...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
A computer protection mechanism is a set of tools for controlling the actions of computations and sa...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
technical reportOperating systems must be flexible in their support for security policies, i.e., the...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and...
International audienceThis paper presents our work concerning flexibility and protection in operating...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
A confined program is one which is unable to leak information to an unauthorized party or modify una...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
A computer protection mechanism is a set of tools for controlling the actions of computations and sa...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
technical reportOperating systems must be flexible in their support for security policies, i.e., the...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and...
International audienceThis paper presents our work concerning flexibility and protection in operating...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
A confined program is one which is unable to leak information to an unauthorized party or modify una...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
A computer protection mechanism is a set of tools for controlling the actions of computations and sa...