Distributed Proving in Access-Control Systems

  • Authors:
  • Lujo Bauer;Scott Garriss;Michael K. Reiter

  • Affiliations:
  • CyLab, Carnegie Mellon University;Carnegie Mellon University;CyLab, Carnegie Mellon University

  • Venue:
  • SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is ...