DocumentCode :
2563161
Title :
Limiting the Damage Potential of Discretionary Trojan Horses
Author :
Karger, Paul A.
fYear :
1987
fDate :
27-29 April 1987
Firstpage :
32
Lastpage :
32
Abstract :
Many discretionary Trojan Horse attacks can be defeated by a table-driven file name translation mechanism that has knowledge of the normal patterns of use of a computer system. File name translation is built into a protected subsystem, and the human user is queried about possible violations of discretionary access control policies. The technique is most effective against unauthorized tampering or sabotage and can be used in conjunction with non-discretionary security controls.
Keywords :
Access control; Computers; Humans; Operating systems; Servers; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1987 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0771-8
Type :
conf
DOI :
10.1109/SP.1987.10011
Filename :
6234900
Link To Document :
بازگشت