Information security: From reference monitors to wrappers

被引:0
|
作者
Badger, L
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information system security has turned out to be much more challenging than at first thought. In the 1980s a great deal of energy was expended in an attempt to create a broad market of security-enhanced systems. This market, however, did not develop, and most computer systems today include only rudimentary security mechanisms. New technologies, however, such as extensible systems and security wrappers, hold promise to reintroduce security as an effective and ubiquitous system service.
引用
收藏
页码:122 / 124
页数:3
相关论文
共 50 条
  • [1] Information security: From reference monitors to wrappers
    Badger, L
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1998, 13 (03) : 32 - 33
  • [2] Teaching the Security Mindset with Reference Monitors
    Cappos, Justin
    Weiss, Richard
    [J]. PROCEEDINGS OF THE 45TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'14), 2014, : 523 - 528
  • [3] Reference Monitors for Security and Interoperability in OAuth 2.0
    Cherrueau, Ronan-Alexandre
    Douence, Remi
    Royer, Jean-Claude
    Sudholt, Mario
    de Oliveira, Anderson Santana
    Roudier, Yves
    Dell'Amico, Matteo
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 235 - 249
  • [4] Modularized design for wrappers/monitors in data warehouse systems
    Horng, JT
    Lu, J
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 54 (03) : 185 - 199
  • [5] Lifting reference monitors from the kernel
    Schneider, FB
    [J]. FORMAL ASPECTS OF SECURITY, 2003, 2629 : 1 - 2
  • [6] Learning logic wrappers for information extraction from the Web
    Badica, C
    Popescu, E
    Badica, A
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 336 - 339
  • [7] Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures
    Karami, Farzane
    Owe, Olaf
    Schneider, Gerardo
    [J]. SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 74 - 91
  • [8] Enterprise wrappers for information assurance
    Feldman, M
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 120 - 122
  • [9] Security wrappers and power analysis for SoC technologies
    Gebotys, CH
    Zhang, Y
    [J]. CODES(PLUS)ISSS 2003: FIRST IEEE/ACM/IFIP INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN & SYSTEM SYNTHESIS, 2003, : 162 - 167
  • [10] Reference model for creating information security policy
    Wang, Ligong
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 279 - 281