2006
DOI: 10.1007/11689522_22
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2006
2006
2007
2007

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…An example is Stack Overflow attack in which each access context of the attack sequence analyzed with system call layer does not violate the DAC policy enforced in UNIX operating systems. The problem is discussed in [8,11]. …”
Section: Extended Reference Monitormentioning
confidence: 99%
See 4 more Smart Citations
“…An example is Stack Overflow attack in which each access context of the attack sequence analyzed with system call layer does not violate the DAC policy enforced in UNIX operating systems. The problem is discussed in [8,11]. …”
Section: Extended Reference Monitormentioning
confidence: 99%
“…We have proposed an extended reference monitor [8,10] with a view to involve the behavioral dimension of security enforcement. Our monitor model attaches a behavior control component to the access control unit thereby providing both access and behavior controls in the system.…”
Section: Our Protection Structure For the Extended Reference Monitormentioning
confidence: 99%
See 3 more Smart Citations