Title :
Limiting the Damage Potential of Discretionary Trojan Horses
Abstract :
Many discretionary Trojan Horse attacks can be defeated by a table-driven file name translation mechanism that has knowledge of the normal patterns of use of a computer system. File name translation is built into a protected subsystem, and the human user is queried about possible violations of discretionary access control policies. The technique is most effective against unauthorized tampering or sabotage and can be used in conjunction with non-discretionary security controls.
Keywords :
Access control; Computers; Humans; Operating systems; Servers; Trojan horses;
Conference_Titel :
Security and Privacy, 1987 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
Print_ISBN :
0-8186-0771-8
DOI :
10.1109/SP.1987.10011