Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Gupta, Sarbari | Gligor, Virgil D.
Affiliations: Dept of Electrical Engineering, University of Maryland, College Park, Maryland 20742, USA
Abstract: A theoretical foundation for penetration analysis of computer systems is presented, which is based on a hypothesis and a set of formalized design properties that characterize penetration resistance. By separating the policy-enforcement mechanisms of a system from the mechanisms necessary to protect the system itself, and by using a unified framework for representing a large set of penetration scenarios, we develop an extensible model for penetration analysis. Furthermore, we illustrate how the model is used to implement automated tools for penetration analysis. The model and tools only address system-penetration patterns caused by unprivileged users' code interactions with a system.
DOI: 10.3233/JCS-1992-1202
Journal: Journal of Computer Security, vol. 1, no. 2, pp. 133-158, 1992
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]