Filters








71,851 Hits in 12.1 sec

Hardware Requirements for Secure Computer Systems: A Framework

Carl E. Landwehr, John M. Carroll
1984 1984 IEEE Symposium on Security and Privacy  
Central to these criteria is the concept of a domain, here interpreted as a set of information and authorizations for the manipulation of that information in a computer system.  ...  This report develops a new set of criteria for evaluating computer architectures that are to support systems with security requirements.  ...  Lubbes of the Naval Electronic Systems Command for his continuing encouragement and support.  ... 
doi:10.1109/sp.1984.10023 dblp:conf/sp/LandwehrC84 fatcat:rbrtyn4ybfdcrp4ffkgtp26shy

An experimental implementation of the kernel/domain architecture

Michale J. Spier, Thomas N. Hastings, David N. Cutler
1973 ACM SIGOPS Operating Systems Review  
implementation of a protective operating system framework, based on the kernel/domain architecture which has increasingly been propounded in recent years.  ...  This paper reports on the more significant ones, specifically: i) the techniques used in mapping a conceptual model onto commercially available hardware (the PDP-ii/45 mini-computer), 2) the domain's memory  ...  domain concept for granted and accepting the implementability and proper protective behavior of domains, we shall concentrate on the memory mapping techniques developed during our actual implementation  ... 
doi:10.1145/957195.808043 fatcat:xerlu5eecffnneiaogbbisf2wy

A multi-level secure file sharing server and its application to a multi-level secure cloud

Mark R. Heckman, Roger R. Schell, Edwards E. Reed
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Contemporary cloud environments are built on lowassurance components, so they cannot provide a high level of assurance about the isolation and protection of information.  ...  Not only are such environments duplicative and costly, data "sharing" must be implemented by massive, wasteful copying of data from low-level domains to high-level domains.  ...  There is a metadata directory for each domain that maps object identifiers to the object storage location.  ... 
doi:10.1109/milcom.2015.7357613 dblp:conf/milcom/HeckmanSR15 fatcat:x3sp7fumlfdrvnofpydmef3gam

CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia

Jinsu Kim, Namje Park, Geonwoo Kim, Seunghun Jin
2019 Electronics  
This paper proposes a character order preserving (COP)-transformation technique that allows the secure protection of video meta-data.  ...  Despite such risks, it is not appropriate to implement encryption for video meta-data considering the efficiency issue.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics8040412 fatcat:nn2veb4e3zhfpod5nlhdwg63da

Experiment of Tamper Detection and Recovery Watermarking in Picture Archiving and Communication Systems

Liew
2010 Journal of Computer Science  
Further development is needed for a program that embeds watermark into images before it is sent to the PACS archive server for storage.  ...  The usage of security measures such as watermarking can protect the integrity of the images.  ...  This technique is not as robust as transform domain techniques and rarely survives various attacks • Transform domain: Most of the transform domain techniques embed the information into the transform coefficients  ... 
doi:10.3844/jcssp.2010.794.799 fatcat:l2jvywfppff4lbogvgvr3r5gs4

A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications

Carlos Colman-Meixner, Chris Develder, Massimo Tornatore, Biswanath Mukherjee
2016 IEEE Communications Surveys and Tutorials  
The second major part of the paper introduces and categorizes a large number of techniques for cloud computing infrastructure resiliency.  ...  We comprehensively survey a large body of work focusing on resilience of cloud computing, in each (or a combination) of the server, network, and application components.  ...  One of the earliest VN mapping approaches using this technique is virtual network topology augmentation for survivable VON mapping (aug-SVON-mapping) [101] where a nonsurvivable VON mapping is augmented  ... 
doi:10.1109/comst.2016.2531104 fatcat:vzvkai7nkrbbda63fesn7zw4di

Separating access control policy, enforcement, and functionality in extensible systems

Robert Grimm, Brian N. Bershad
2001 ACM Transactions on Computer Systems  
It structures the system into protection domains, enforces protection domains through access control checks, and performs auditing of system operations.  ...  We describe the design of this access control mechanism, present an implementation within the SPIN extensible operating system, and provide a qualitative as well as quantitative evaluation of the mechanism  ...  Marc Fiuczynski, Tian Lim, Yasushi Saito, Emin Gün Sirer, and especially Przemysław Pardyak at the University of Washington were most helpful with various implementation issues and the integration of our  ... 
doi:10.1145/367742.367773 fatcat:ct4xomolq5fk7bowgcd3rfiivm

Large Scale DNS Analysis [chapter]

Samuel Marchal, Thomas Engel
2012 Lecture Notes in Computer Science  
We propose a system that leverages distributed processing and storage facilities.  ...  The analysis of DNS traffic is becoming of first importance currently, as it allows to monitor the main part of the interactions on the Internet.  ...  In our first trial, we have implemented the storage system using a relational database system (MySQL).  ... 
doi:10.1007/978-3-642-30633-4_20 fatcat:yhc73tinxng47bvxsphfipxahe

Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems

Georgia Psychou, Dimitrios Rodopoulos, Mohamed M. Sabry, Tobias Gemmeke, David Atienza, Tobias G. Noll, Francky Catthoor
2017 ACM Computing Surveys  
, the mapping and platform software.  ...  A systematic classification of approaches that increase system resilience in presence of functional hardwareinduced errors is presented, dealing with higher system abstractions: i.e. the (micro-) architecture  ...  Implementation of the primary/backup technique can take place at several layers of the software stack. Pros include the high error protection at minimum storage and rather general applicability.  ... 
doi:10.1145/3092699 fatcat:enagagwsazf4hf5lfpziaobkgi

Need of Security in Health Care Automation: Survey Report

Soniya Raghu
2019 International Journal for Research in Applied Science and Engineering Technology  
For privacy preservation some techniques are used in proposed work, these techniques are RBAC, and ABAC, which establishes a mitigation approach called RABAC, access matrix with RABAC is applied for the  ...  Presented work focused on privacy protection of electronic medical records in cloud environment. Therefore, data needs to be protected from intruders and attackers and should have private storage.  ...  Advantages of EHR 1) Stores accurate data. 2) Captures current state of patient every time. In [1] implemented a system which replaces AES technique by using Attribute based encryption technique.  ... 
doi:10.22214/ijraset.2019.5517 fatcat:j5nn643cyvbmzb2v3qk7hvvfpa

Secure Virtual Machine Execution under an Untrusted Management OS

Chunxiao Li, Anand Raghunathan, Niraj K. Jha
2010 2010 IEEE 3rd International Conference on Cloud Computing  
We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM.  ...  We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services.  ...  A technique that protects the confidentiality and integrity of communication is transport layer security (TLS) [18] .  ... 
doi:10.1109/cloud.2010.29 dblp:conf/IEEEcloud/LiRJ10 fatcat:5kgk23hr2vgwnf6hm54m6osd3y

Computer Forensic Functions Testing: Media Preparation, Write Protection and Verification

Yinghua Guo, Jill Slay
2010 Journal of Digital Forensics, Security and Law  
We focus this paper on the functions of media preparation, write protection and verification. Specifically, we complete the function mapping of these functions and specify their requirements.  ...  The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable  ...  Hence, the basic strategy for implementing a write protection is to place a filter between a host computer and a secondary storage device. This filter monitors I/O commands issued by the application.  ... 
doi:10.15394/jdfsl.2010.1072 fatcat:py4a6fnyi5a65pge7nz3idavum

Harbor: Software-based Memory Protection For Sensor Nodes

Ram Kumar, Eddie Kohler, Mani Srivastava
2007 2007 6th International Symposium on Information Processing in Sensor Networks  
In this paper, we propose a memory protection scheme that prevents the corruption of operating system state by buggy applications.  ...  Severe resource constraints on the sensor node present interesting challenges in designing a sandbox for user applications. We have implemented and tested our scheme on the SOS operating system.  ...  The memory map itself 1 Our implementation on AVR uses a block size of 8 bytes is protected from wild writes as it is a part of the kernel state.  ... 
doi:10.1109/ipsn.2007.4379694 fatcat:3ktzoeofdfadrhwaujgfabqmc4

VMGuard: An Integrity Monitoring System for Management Virtual Machines

Haifeng Fang, Yiqiang Zhao, Hongyong Zang, H. Howie Huang, Ying Song, Yuzhong Sun, Zhiyong Liu
2010 2010 IEEE 16th International Conference on Parallel and Distributed Systems  
Therefore, it is critical for a cloud computing system to ensure the trustworthiness of management VMs.  ...  The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data.  ...  To access the machine memory belonging to the domains, we add a simple domain memory mapping module, domain page-table manager.  ... 
doi:10.1109/icpads.2010.44 dblp:conf/icpads/FangZZHSSL10 fatcat:5lihqkj4ubhwfbygnptrvutbeq

DeclStore: Layering Is for the Faint of Heart

Noah Watkins, Michael A. Sevilla, Ivo Jimenez, Kathryn Dahlgren, Peter Alvaro, Shel Finkelstein, Carlos Maltzahn
2017 USENIX Workshop on Hot Topics in Storage and File Systems  
Acknowledgements: This work was partially funded by the Center for Research in Open Source Software, DOE Award DE-SC0016074, and NSF Award 1450488.  ...  Unfortunately, evolving storage system interfaces is a challenging task requiring domain expertise, and is predicated on the willingness of programmers to forfeit the protection from change afforded by  ...  And while our implementation does not yet map a declarative specification on to a particular physical design, the specification provides a powerful infrastructure for automating this mapping and achieving  ... 
dblp:conf/hotstorage/WatkinsSJDAFM17 fatcat:bxqtimwx6nc7jdv4qmz7r23dia
« Previous Showing results 1 — 15 out of 71,851 results