메뉴 건너뛰기




Volumn 9, Issue 2, 2012, Pages 173-183

Data-provenance verification for secure hosts

Author keywords

Authentication; cryptography; malware; networking; provenance

Indexed keywords

AUTHENTICATION; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; NETWORK SECURITY; TRUSTED COMPUTING;

EID: 84863028103     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.50     Document Type: Article
Times cited : (26)

References (37)
  • 2
    • 34548708575 scopus 로고    scopus 로고
    • Lurking in the shadows: Identifying systemic threats to kernel data (short paper)
    • DOI 10.1109/SP.2007.25, 4223229, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • A. Baliga, P. Kamat, and L. Iftode, "Lurking in the Shadows: Identifying Systemic Threats to Kernel Data," Proc. IEEE Symp. Security and Privacy, pp. 246-251, 2007. (Pubitemid 47432531)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 246-251
    • Baliga, A.1    Kamat, P.2    Iftode, L.3
  • 5
    • 33846286141 scopus 로고    scopus 로고
    • Design and implementation of an extrusion-based break-in detector for personal computers
    • DOI 10.1109/CSAC.2005.19, 1565263, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
    • W. Cui, R. H. Katz, and W. tian Tan, "Design and Implementation of an Extrusion-Based Break-in Detector for Personal Computers," Proc. 21st Ann. IEEE Computer Security Applications Conf. (ACSAC'05), pp. 361-370, 2005. (Pubitemid 46116492)
    • (2005) Proceedings - Annual Computer Security Applications Conference, ACSAC , vol.2005 , pp. 361-370
    • Cui, W.1    Katz, R.H.2    Tan, W.-T.3
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, vol. 19, pp. 236-243, May 1976.
    • (1976) Comm. ACM , vol.19 , pp. 236-243
    • Denning, D.E.1
  • 7
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning, "Certification of Programs for Secure Information Flow," Comm. ACM, vol. 20, pp. 504-513, July 1977.
    • (1977) Comm. ACM , vol.20 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • Bot Miner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Bot Miner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection," Proc. 17th USENIX Security Symp., 2008.
    • (2008) Proc. 17th USENIX Security Symp.
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 20
    • 85077302433 scopus 로고    scopus 로고
    • Bump in the ether: A framework for securing sensitive user input
    • General Track
    • J. M. McCune, A. Perrig, and M. K. Reiter, "Bump in the Ether: A Framework for Securing Sensitive User Input," Proc. USENIX Ann. Technical Conf., General Track, pp. 185-198, 2006.
    • (2006) Proc. USENIX Ann. Technical Conf. , pp. 185-198
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 27
    • 84944486544 scopus 로고
    • Prediction and entropy of printed english
    • C. Shannon, "Prediction and Entropy of Printed English," Bell System Technical J., vol. 30, no. 1, pp. 50-64, 1951.
    • (1951) Bell System Technical J. , vol.30 , Issue.1 , pp. 50-64
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.