In systems with shared resources, authorization pol-icy enforcement ensures that these resources are acces-sible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating sys-tem, and (ii) enable user-space servers to enforce autho-rization policies on their clients. A popular mechanism for authorization policy enforcement retrofits the code to be secured with hooks to a reference monitor. This is the basis for the Linux security modules (LSM) framework, and is also the intended usage of the recently-released security-enhanced Linux policy management framework for user-space servers. Unfortunately, reference monitor hooks are currently plac...
Researchers have argued that the best way to construct a secure system is to proactively integrate s...
To my father Angelo (Tito) This thesis addresses the problem of statically verifying and enforcing a...
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about crede...
Abstract. Many security-sensitive programs manage resources on behalf of mu-tually distrusting clien...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
The Linux Security Modules (LSM) framework is a set of authorization hooks for implementing flexible...
open access articleToday, Linux users use sudo/su commands to attribute Linux’s administrative privi...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Abstract. Access control is a critical functionality in distributed sys-tems. Services and resources...
Researchers have long argued that the best way to construct a secure system is to proactively integr...
The evolution of technological progress continually presents new information security challenges for...
To my father Angelo (Tito) This thesis addresses the problem of statically verifying and enforcing a...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Inside cyber security threats by system administrators are some of the main concerns of organization...
Researchers have argued that the best way to construct a secure system is to proactively integrate s...
To my father Angelo (Tito) This thesis addresses the problem of statically verifying and enforcing a...
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about crede...
Abstract. Many security-sensitive programs manage resources on behalf of mu-tually distrusting clien...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
The Linux Security Modules (LSM) framework is a set of authorization hooks for implementing flexible...
open access articleToday, Linux users use sudo/su commands to attribute Linux’s administrative privi...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Abstract. Access control is a critical functionality in distributed sys-tems. Services and resources...
Researchers have long argued that the best way to construct a secure system is to proactively integr...
The evolution of technological progress continually presents new information security challenges for...
To my father Angelo (Tito) This thesis addresses the problem of statically verifying and enforcing a...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Inside cyber security threats by system administrators are some of the main concerns of organization...
Researchers have argued that the best way to construct a secure system is to proactively integrate s...
To my father Angelo (Tito) This thesis addresses the problem of statically verifying and enforcing a...
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about crede...