Operating systems must be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide variety of real-world security policies. Such flexibility requires controlling the propagation of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted access rights. Previous systems are lacking in at least one of these areas. In this paper we present an operating system security architecture that solves these problems. Control over propagation is provided by ensuring that the security policy is consulted for every security decision. This control is achieved without significant performance degradation through the use of a security decision caching mechanism that...
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and...
Container platforms ease the deployment of applications and respond to failures. The advantages of c...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
technical reportOperating systems must be flexible in their support for security policies, i.e., the...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
International audienceThis paper presents our work concerning flexibility and protection in operating...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Abstract. We describe the motivation for moving policy enforcement for access control down to the di...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and...
Container platforms ease the deployment of applications and respond to failures. The advantages of c...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
technical reportOperating systems must be flexible in their support for security policies, i.e., the...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
The evaluation of computer systems has been an important issue for many years, as evidenced by the i...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
International audienceThis paper presents our work concerning flexibility and protection in operating...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Abstract. We describe the motivation for moving policy enforcement for access control down to the di...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and...
Container platforms ease the deployment of applications and respond to failures. The advantages of c...
AbstractPersonalized security in E-banking is an important issue for many individuals and companies ...