A Reliable File Protection System Based on Transparent Encryption
暂无分享,去创建一个
Jun Liu | Mingwei Lin | Shuyu Chen | Han Liu
[1] V. N. Venkatakrishnan,et al. Data Sandboxing: A Technique for Enforcing Confidentiality Policies , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[2] Helen Ashman,et al. Anomaly Detection over User Profiles for Intrusion Detection , 2010 .
[3] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[4] Satoru Tezuka,et al. Proposal of File Access Control Scheme for Client Protecting Information Assets from Illegal Programs , 2005 .
[5] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[6] Xiao Bo Huang,et al. Research on Firewall System for Confidential Network , 2012 .
[7] Anurag Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications , 2000, USENIX Security Symposium.
[8] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[9] Brent B Welch,et al. Practical Programming in Tcl and Tk , 1999 .
[10] Diomidis Spinellis,et al. Sandboxing Applications , 2001, USENIX Annual Technical Conference, FREENIX Track.
[11] Aiguo He,et al. A Case Study: File Access Privacy Control Using Filter Hook Driver , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.