메뉴 건너뛰기




Volumn , Issue , 2008, Pages 55-64

PinUP: Pinning user files to known applications

Author keywords

[No Author keywords available]

Indexed keywords

EMAIL CLIENTS; LINUX SECURITY MODULES; MALCODE; OFFICE APPLICATIONS; PRACTICAL USE; PROTECTION MECHANISMS; SYSTEM PROTECTIONS; USER DATUM; WORK-FLOWS;

EID: 60649099375     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.41     Document Type: Conference Paper
Times cited : (13)

References (31)
  • 1
  • 2
    • 60649114437 scopus 로고    scopus 로고
    • J. P. Anderson. Computer security technology planning study. ESDTR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as I, DITCAD-758206. II DITCAD-772806).
    • J. P. Anderson. Computer security technology planning study. ESDTR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206. Vol. II DITCAD-772806).
  • 4
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations
    • Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
    • D. E. Bell and L. J. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 12
    • 0031368810 scopus 로고    scopus 로고
    • Support for discretionary role based access control in ACL-oriented operating systems
    • C. Friberg and A. Held. Support for discretionary role based access control in ACL-oriented operating systems. In ACM workshop on Role-based access control, 1997.
    • (1997) ACM workshop on Role-based access control
    • Friberg, C.1    Held, A.2
  • 13
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applicationos: Confining the wily hacker
    • I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applicationos: Confining the wily hacker. In USENIX Security Symposium, 1996.
    • (1996) USENIX Security Symposium
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.4
  • 16
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of ACSAC, 1994.
    • (1994) Proceedings of ACSAC
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 17
    • 1642325574 scopus 로고
    • Strengthening discresionary access controls to inhibit trojan horses and computer viruses
    • N. Lai and T. Gray. Strengthening discresionary access controls to inhibit trojan horses and computer viruses. In Proceedings of USENIX Summer Symposium, 1988.
    • (1988) Proceedings of USENIX Summer Symposium
    • Lai, N.1    Gray, T.2
  • 19
    • 33845953872 scopus 로고    scopus 로고
    • National Security Agency, SELinux
    • National Security Agency. Security-enhanced Linux (SELinux). http://www.nsa.gov/selinux.
    • Security-enhanced Linux
  • 23
    • 0029714667 scopus 로고    scopus 로고
    • Unified login with pluggable authentication modules (PAM)
    • V. Samar. Unified login with pluggable authentication modules (PAM). In Proceedings of ACM CCS, 1996.
    • (1996) Proceedings of ACM CCS
    • Samar, V.1
  • 26
    • 60649086326 scopus 로고    scopus 로고
    • Sub-identities: Towards operating system support for distributed system security
    • Technical Report 2005-18, University of Notre Dame, Department of Computer Science and Engineering, Oct
    • P. Snowberger and D. Thain. Sub-identities: Towards operating system support for distributed system security. Technical Report 2005-18, University of Notre Dame, Department of Computer Science and Engineering, Oct. 2005.
    • (2005)
    • Snowberger, P.1    Thain, D.2
  • 28
    • 33646185580 scopus 로고    scopus 로고
    • Polaris: Virus safe computing for windows xp
    • Technical Report HPL-2004-221, HP Laboratories Palo Alto, Dec
    • M. Stiegler, A. Karp, K.-P. Yee, and M. Miller. Polaris: Virus safe computing for windows xp. Technical Report HPL-2004-221, HP Laboratories Palo Alto, Dec. 2004.
    • (2004)
    • Stiegler, M.1    Karp, A.2    Yee, K.-P.3    Miller, M.4
  • 29
    • 21644486314 scopus 로고    scopus 로고
    • Trusted Computing Group, Revision 1.2, Apr. 2004
    • Trusted Computing Group. TCG specification architecture overview: Revision 1.2. http://www.trustedcomputinggroup.org, Apr. 2004.
    • TCG specification architecture overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.