Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Simone Mutti"'
Autor:
Edward G. Amoroso, Jeffrey S. Bardin, Cataldo Basile, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Matteo Maria Casalino, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Rozita Dara, Christopher Day, Sabrina De Capitani di Vimercati, Tewfiq El Maliki, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Angelo Genovese, Anna Granova, William F. Gross, Yong Guan, Cem Gurkok, Feng Hao, Tarfa Hamed, James T. Harmening, Rich Hoffman, Emin Huseynov, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, John Benjamin Khan, Larry Korba, Kameswari Kotapati, Stefan C. Kremer, Thomas F. LaPorta, Jean Lencrenon, Keith Lewis, Peng Liu, Giovanni Livraga, John R. Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Nailah Mims, Simone Mutti, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, James Pooley, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Pierangela Samarati, Marco Santambrogio, Mario Santana, Steve Schneider, Fabio Scotti, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Michael A. West, Dan Wing, George O.M. Yee, Liang Yan, Roman Zabicki, Gansen Zhao, Zhe Zias
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::499603800871b1c5e5e1573afaf79d52
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
Autor:
Giovanni Vigna, Christopher Kruegel, Simone Mutti, Yanick Fratantonio, Luca Invernizzi, Antonio Bianchi, Kirat Dhilung Hang, Jacopo Corbetta
Publikováno v:
ACSAC
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google's Bouncer and Andrubis. Emulators are the go-to choice because of their convenience: they ca
Publikováno v:
ACSAC
Proceedings of the 31st Annual Computer Security Applications Conference on-ACSAC 2015
Proceedings of the 31st Annual Computer Security Applications Conference on-ACSAC 2015
SQLite is the most widely deployed in-process library that implements a SQL database engine. It offers high storage efficiency, fast query operation and small memory needs. Due to the fact that a complete SQLite database is stored in a single cross-p
Publikováno v:
AsiaCCS
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security-ASIA CCS 15
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security-ASIA CCS '15
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security-ASIA CCS 15
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security-ASIA CCS '15
Android has recently introduced the support for Mandatory Access Control, which extends previous security services relying on the Android Permission Framework and on the kernel-level Discretionary Access Control. This extension has been obtained with
Publikováno v:
2015 IEEE Conference on Communications and Network Security (CNS)
CNS
CNS
The support for Mandatory Access Control offered by SELinux has become a significant component of the security design of the Android operating system, offering robust protection and the ability to support system-level policies enforced by all the ele
Publikováno v:
Information Systems Security ISBN: 9783319269603
ICISS
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Systems Security
Information Systems Security
ICISS
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Systems Security
Information Systems Security
Solutions like SELinux have recently regenerated interest toward Mandatory Access Control MAC models. The role of MAC models can be expected to increase in modern systems, which are exposed to significant threats and manage high-value resources, due
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9db9bfa1201875b482c31bce2e7ef5c0
https://doi.org/10.1007/978-3-319-26961-0_3
https://doi.org/10.1007/978-3-319-26961-0_3
Publikováno v:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense-SafeConfig '15
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense-SafeConfig 15
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
SafeConfig@CCS
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense-SafeConfig 15
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
SafeConfig@CCS
The exponential growth of modern information systems has introduced several new challenges in the management of security requirements. Nowadays, the technological scenario has evolved and the introduction of MAC models provides a better isolation amo
Publikováno v:
SACMAT
The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may increase the total cost of management
Publikováno v:
Scopus-Elsevier
The design of efficient and effective techniques for security policy analysis is a crucial open problem in modern information systems. Significant attention has been dedicated in the past to the use of logical tools for the analysis of security polic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c93f99825e196f8e6c472a30f442d7e1
http://www.scopus.com/inward/record.url?eid=2-s2.0-84870999853&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-84870999853&partnerID=MN8TOARS
Publikováno v:
2015 IEEE Conference on Communications and Network Security (CNS)
CNS
CNS
The wide adoption of Docker and the ability to retrieve images from different sources impose strict security constraints. Docker leverages Linux kernel security facilities, such as namespaces, cgroups and Mandatory Access Control, to guarantee an eff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5d22da1758b8f9804889a6fb77266a98