Policy models to protect resource retrieval
Abstract
References
Index Terms
- Policy models to protect resource retrieval
Recommendations
Process firewalls: protecting processes during resource access
EuroSys '13: Proceedings of the 8th ACM European Conference on Computer SystemsProcesses retrieve a variety of resources from the operating system in order to execute properly, but adversaries have several ways to trick processes into retrieving resources of the adversaries' choosing. Such resource access attacks use name ...
Blue versus Red: Towards a Model of Distributed Security Attacks
Financial Cryptography and Data SecurityWe develop a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target systems, however, may suffer penalties for increased ...
Protecting information infrastructure from DDoS attacks by MADF
Distributed Denial of Service (DDoS) attacks have become one of the most serious threats to the information infrastructure. In this paper, we propose a new approach, Mark-Aided Distributed Filtering (MADF), to find the network anomalies by using a back-...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Sylvia Osborn,
- Program Chairs:
- Mahesh V. Tripunitara,
- Ian M. Molloy
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 165Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in