Schear, 2007 - Google Patents
The Design and Implementation of Glavlit: A Transparent Data Confinement SystemSchear, 2007
View PDF- Document ID
- 6520522694977283672
- Author
- Schear N
- Publication year
External Links
Snippet
I would like to acknowledge the assistance of the faculty and students in the sysnet group at UCSD for providing feedback, encouragement, and resources that proved invaluable to the success of this work. I also acknowledge the aid provided by the chair of my committee …
- 238000000034 method 0 description 50
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ullah et al. | Data exfiltration: A review of external attack vectors and countermeasures | |
US9985994B2 (en) | Enforcing compliance with a policy on a client | |
EP1634175B1 (en) | Multilayer access control security system | |
US9240945B2 (en) | Access, priority and bandwidth management based on application identity | |
US9661013B2 (en) | Manipulating API requests to indicate source computer application trustworthiness | |
US9800608B2 (en) | Processing data flows with a data flow processor | |
US7874012B2 (en) | Privileged access to encrypted data | |
EP2432188A1 (en) | Systems and methods for processing data flows | |
US20080262990A1 (en) | Systems and methods for processing data flows | |
US20080134330A1 (en) | Systems and methods for processing data flows | |
US20040064537A1 (en) | Method and apparatus to enable efficient processing and transmission of network communications | |
US9374339B2 (en) | Authentication of remote host via closed ports | |
US20070245137A1 (en) | HTTP cookie protection by a network security device | |
US11822660B2 (en) | Disarming malware in protected content | |
CN111884801A (en) | Federated key management | |
US20020129239A1 (en) | System for secure communication between domains | |
Schear et al. | Glavlit: Preventing exfiltration at wire speed | |
Nair et al. | Security attacks in internet of things | |
Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
CN117439799A (en) | Anti-tampering method for http request data | |
Buchholz | Pervasive binding of labels to system processes | |
Schear | The Design and Implementation of Glavlit: A Transparent Data Confinement System | |
Alsaleem et al. | Cloud computing-based attacks and countermeasures: A survey | |
Parekh | Privacy-preserving distributed event corroboration | |
Islam et al. | An approach to security for unstructured big data |