메뉴 건너뛰기




Volumn , Issue , 2009, Pages 232-239

Identifying and resolving least privilege violations in software architectures

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL TRANSFORMATION; BODY OF KNOWLEDGE; LEAST PRIVILEGE; SECURITY LEVEL; SECURITY PRINCIPLES; SECURITY PROPERTIES; SOFTWARE SYSTEMS;

EID: 70349694735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.48     Document Type: Conference Paper
Times cited : (3)

References (35)
  • 1
    • 33845384768 scopus 로고    scopus 로고
    • Mapbox: Using parameterized behavior classes to confine applications
    • Technical report, Santa Barbara, CA, USA
    • Anurag Acharya and Mandar Raje. Mapbox: Using parameterized behavior classes to confine applications. Technical report, Santa Barbara, CA, USA, 1999.
    • (1999)
    • Acharya, A.1    Raje, M.2
  • 6
    • 85084162921 scopus 로고    scopus 로고
    • David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th USENIX Security Symposium, August 2004.
    • David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th USENIX Security Symposium, August 2004.
  • 7
    • 70349675001 scopus 로고    scopus 로고
    • Koen Buyens, Bart De Win, and Wouter Joosen. Identifying and resolving least privilege violations in software architectures. Technical report, Katholieke Universiteit Leuven, 2008, to be published.
    • Koen Buyens, Bart De Win, and Wouter Joosen. Identifying and resolving least privilege violations in software architectures. Technical report, Katholieke Universiteit Leuven, 2008, to be published.
  • 8
    • 2942749266 scopus 로고    scopus 로고
    • Bluebox: A policy-driven, hostbased intrusion detection system
    • Suresh N. Chari and Pau-Chen Cheng. Bluebox: A policy-driven, hostbased intrusion detection system. ACM Trans. Inf. Syst. Secur., 6(2):173-200, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.2 , pp. 173-200
    • Chari, S.N.1    Cheng, P.-C.2
  • 14
    • 57349158625 scopus 로고    scopus 로고
    • S. Höhn and J. Jürjens. Rubacon: automated support for modelbased compliance engineering. In Proceedings of the 13th international conference on Software engineering, pages 875-878. ACM New York, NY, USA, 2008.
    • S. Höhn and J. Jürjens. Rubacon: automated support for modelbased compliance engineering. In Proceedings of the 13th international conference on Software engineering, pages 875-878. ACM New York, NY, USA, 2008.
  • 17
    • 70349695664 scopus 로고    scopus 로고
    • K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In In ISOC Network and Distributed System Security, 2000.
    • K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In In ISOC Network and Distributed System Security, 2000.
  • 20
    • 58049188768 scopus 로고    scopus 로고
    • Van Landuyt, Johan Gregoire, Sam Michiels, Eddy Truyen, and Wouter Joosen. Architectural design of a digital publishing system
    • Technical report, October
    • Dimitri Van Landuyt, Johan Gregoire, Sam Michiels, Eddy Truyen, and Wouter Joosen. Architectural design of a digital publishing system. Technical report, October 2006.
    • (2006)
    • Dimitri1
  • 21
    • 0037368172 scopus 로고    scopus 로고
    • An empiricallybased process for software architecture evaluation
    • March
    • Mikael Lindvall, Roseanne T. Tvedt, and Patricia Costa. An empiricallybased process for software architecture evaluation. Empirical Software Engineering, 8(1):83-108, March 2003.
    • (2003) Empirical Software Engineering , vol.8 , Issue.1 , pp. 83-108
    • Lindvall, M.1    Tvedt, R.T.2    Costa, P.3
  • 22
    • 70349693438 scopus 로고    scopus 로고
    • Pratyusa K. Manadhata, Dilsun K. Kaynar, and Jeannette M. Wing. A formal model for a systems attack surface. Technical Report CMU-CS- 07-144, Carnegie Mellon University, 2007.
    • Pratyusa K. Manadhata, Dilsun K. Kaynar, and Jeannette M. Wing. A formal model for a systems attack surface. Technical Report CMU-CS- 07-144, Carnegie Mellon University, 2007.
  • 25
    • 43949109911 scopus 로고    scopus 로고
    • Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alberto Siena, and Angelo Susi. Tool-supported development with tropos: The conference management system case study. In Michael Luck and Lin Padgham, editors, Agent Oriented Software Engineering VIII, 4951 of LNCS, pages 182-196. Springer, 2008.
    • Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alberto Siena, and Angelo Susi. Tool-supported development with tropos: The conference management system case study. In Michael Luck and Lin Padgham, editors, Agent Oriented Software Engineering VIII, volume 4951 of LNCS, pages 182-196. Springer, 2008.
  • 26
    • 85084160542 scopus 로고    scopus 로고
    • David S. Peterson, Matt Bishop, and Raju Pandey. A flexible containment mechanism for executing untrusted code. In Proceedings of the 11th USENIX Security Symposium, pages 207-225, Berkeley, CA, USA, 2002. USENIX Association.
    • David S. Peterson, Matt Bishop, and Raju Pandey. A flexible containment mechanism for executing untrusted code. In Proceedings of the 11th USENIX Security Symposium, pages 207-225, Berkeley, CA, USA, 2002. USENIX Association.
  • 27
    • 70349652782 scopus 로고    scopus 로고
    • Niels Provos. Systrace, interactive policy generation for system calls
    • Niels Provos. Systrace - interactive policy generation for system calls.
  • 28
    • 70349655052 scopus 로고    scopus 로고
    • Jie Ren. A connector-centric approach to architectural access control. PhD thesis, Long Beach, CA, USA, 2006. Adviser-Richard N. Taylor.
    • Jie Ren. A connector-centric approach to architectural access control. PhD thesis, Long Beach, CA, USA, 2006. Adviser-Richard N. Taylor.
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278- 1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 31
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 33
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • Technical Report CSD-99-1056, 12
    • David A. Wagner. Janus: an approach for confinement of untrusted applications. Technical Report CSD-99-1056, 12, 1999.
    • (1999)
    • Wagner, D.A.1
  • 35
    • 0036612912 scopus 로고    scopus 로고
    • A methodology for architecturelevel reliability risk analysis
    • June
    • Sherif M. Yacoub and Hany H. Ammar. A methodology for architecturelevel reliability risk analysis. IEEE Transactions on Software Engineering, 28(6):529-547, June 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.6 , pp. 529-547
    • Yacoub, S.M.1    Ammar, H.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.