[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Schear, 2007 - Google Patents

The Design and Implementation of Glavlit: A Transparent Data Confinement System

Schear, 2007

View PDF
Document ID
6520522694977283672
Author
Schear N
Publication year

External Links

Snippet

I would like to acknowledge the assistance of the faculty and students in the sysnet group at UCSD for providing feedback, encouragement, and resources that proved invaluable to the success of this work. I also acknowledge the aid provided by the chair of my committee …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Ullah et al. Data exfiltration: A review of external attack vectors and countermeasures
US9985994B2 (en) Enforcing compliance with a policy on a client
EP1634175B1 (en) Multilayer access control security system
US9240945B2 (en) Access, priority and bandwidth management based on application identity
US9661013B2 (en) Manipulating API requests to indicate source computer application trustworthiness
US9800608B2 (en) Processing data flows with a data flow processor
US7874012B2 (en) Privileged access to encrypted data
EP2432188A1 (en) Systems and methods for processing data flows
US20080262990A1 (en) Systems and methods for processing data flows
US20080134330A1 (en) Systems and methods for processing data flows
US20040064537A1 (en) Method and apparatus to enable efficient processing and transmission of network communications
US9374339B2 (en) Authentication of remote host via closed ports
US20070245137A1 (en) HTTP cookie protection by a network security device
US11822660B2 (en) Disarming malware in protected content
CN111884801A (en) Federated key management
US20020129239A1 (en) System for secure communication between domains
Schear et al. Glavlit: Preventing exfiltration at wire speed
Nair et al. Security attacks in internet of things
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
CN117439799A (en) Anti-tampering method for http request data
Buchholz Pervasive binding of labels to system processes
Schear The Design and Implementation of Glavlit: A Transparent Data Confinement System
Alsaleem et al. Cloud computing-based attacks and countermeasures: A survey
Parekh Privacy-preserving distributed event corroboration
Islam et al. An approach to security for unstructured big data