The functionality-based application confinement model
نویسندگان
چکیده
منابع مشابه
Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions
Traditional user-oriented access control models such as Mandatory Access Control (MAC) and Discretionary Access Control (DAC) cannot differentiate between processes acting on behalf of users and those behaving maliciously. Consequently, these models are limited in their ability to protect users from the threats posed by vulnerabilities and malicious software as all code executes with full acces...
متن کاملReusability of Functionality-Based Application Confinement Policy Abstractions
Traditional access control models and mechanisms struggle to contain the threats posed by malware and software vulnerabilities as these cannot differentiate between processes acting on behalf of users and those posing threats to users’ security as every process executes with the full set of the user's privileges. Existing application confinement schemes attempt to address this by limiting the a...
متن کاملFunctionality-Based Application Confinement: A Parameterised and Hierarchical Approach to Policy Abstraction for Rule-based Application-oriented Access Controls
ions 0 1 6 7
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولطراحی، ساخت و کنترل model based یک روبات موازی هگزا
توسعه و افزایش تولید صنایع و در پی آن رشد اقتصادی و اجتماعی یک جامعه در قرن جدید، با خودکار کردن روندهای تولید گره خورده است. یکی از اجزای خودکار ساختن صنایع، استفاده از روباتها در چرخه تولید به منظورهای مختلف می¬باشد؛ رنگ پاشی، جابجایی، نصب قطعات و جوشکاری بخش کوچکی از فضایی است که به روباتهای کارا نیازمند است. پس از استفاده فراوان از روباتهای سرال در صنایع و انجام پژوهشهای پایه¬ای بر روی طراح...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2013
ISSN: 1615-5262,1615-5270
DOI: 10.1007/s10207-013-0199-4