Since the integrity policy model has been proposed, its maturity has always been lower than that of the confidentiality policy model. The restriction is due to integrity level dividing and usability. In this paper, different kinds of integrity models are summarized from the point of practicability with their characteristics concluded. Based on the previous discussion, this paper presents a practical dynamic integrity protection model called DMIP. It simplifies the intricacy of integrity level dividing and solves the existing problems on practicability of current integrity models especially for Linux. The DMIP is designed to preserve the integrity of system from potential network-based attacks and local malicious files. From the usability of...
The article describes the concept of the information integrity, control information integrity and th...
This dissertation is about the implementation and integration of the interactive markup language to ...
We propose a new method for integrity checking in deductive databases. The method augments a databas...
Unlike today's reactive approaches, information ow based approaches can provide positive assur...
Host compromise is a serious security problem for operating systems. Most previous solutions based o...
从完整性保护模型提出到现在,其成熟度远不如机密性模型.究其原因,完整级划分以及模型实用性是制约其发展的根本因素.从完整性模型的实用性角度出发,归纳总结几种现有完整性保护模型的优缺点,提出了一种实用型的...
Subverting runtime data flow is common in many current software attacks. Data Flow Integrity (DFI) i...
AbstractWe introduce a mechanism for the verification of real-time integrity policies about the oper...
Two different approaches have been traditionally considered for dealing with the process of integrit...
Data integrity is critical to the secure operation of a computer system. Applications need to know t...
We introduce a mechanism for the verification of real-time integrity policies about the operation of...
Digital rights management systems allow copyrighted content to be commercialized in digital format w...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
This paper introduces a general, set-theoretic model for expressing dynamic integrity constraints, i...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
The article describes the concept of the information integrity, control information integrity and th...
This dissertation is about the implementation and integration of the interactive markup language to ...
We propose a new method for integrity checking in deductive databases. The method augments a databas...
Unlike today's reactive approaches, information ow based approaches can provide positive assur...
Host compromise is a serious security problem for operating systems. Most previous solutions based o...
从完整性保护模型提出到现在,其成熟度远不如机密性模型.究其原因,完整级划分以及模型实用性是制约其发展的根本因素.从完整性模型的实用性角度出发,归纳总结几种现有完整性保护模型的优缺点,提出了一种实用型的...
Subverting runtime data flow is common in many current software attacks. Data Flow Integrity (DFI) i...
AbstractWe introduce a mechanism for the verification of real-time integrity policies about the oper...
Two different approaches have been traditionally considered for dealing with the process of integrit...
Data integrity is critical to the secure operation of a computer system. Applications need to know t...
We introduce a mechanism for the verification of real-time integrity policies about the operation of...
Digital rights management systems allow copyrighted content to be commercialized in digital format w...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
This paper introduces a general, set-theoretic model for expressing dynamic integrity constraints, i...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
The article describes the concept of the information integrity, control information integrity and th...
This dissertation is about the implementation and integration of the interactive markup language to ...
We propose a new method for integrity checking in deductive databases. The method augments a databas...