Sciweavers

228 search results - page 1 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
13 years 10 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
APWEB
2011
Springer
12 years 8 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
USENIX
2001
13 years 6 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
INFOSCALE
2007
ACM
13 years 6 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
SOUPS
2006
ACM
13 years 10 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis