×
Mandatory access control systems (MAC ) are often criticised for their lack of flexibility, but they protect a system's confidentiality from a wide range of ...
Jul 10, 2000 · Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. July 2000; Lecture Notes in Computer Science.
To design AS-DAC, the Advanced Security Discretionary Access Control. Model, which should protect a system's confidentiality against Trojan Horse programs, we ...
Trojan horse resistant discretionary access control · Configuring role-based access control to enforce mandatory and discretionary access control policies · A ...
The article discusses the algorithm for combining role and mandatory security policies. The security policy was simulated, including role-based and ...
4.3 Confidentiality Protection in IFEDAC. As in integrity protection, DAC assumes all programs to be benign for confidentiality. For example, when one uses ...
While the default policy model of IFEDAC provides strong se- curity guarantees to protect both core system files and user-owned files against trojan horses and ...
We show that it is possible to have the best of both worlds: DAC's easy-to-use discretionary policy and MAC's defense against trojan horses and buggy programs.
Missing: Confidentiality | Show results with:Confidentiality
Mar 10, 2008 · Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC ...
Modern commercial of the shelf operating systems use Discretionary Access Control (DAC) to protect files and other operating system resources.
Missing: Confidentiality | Show results with:Confidentiality