To obtain access to full text of journal and articles you must register!
- Article name
- Defending from malicious applications attacks. Access control models
- Authors
- Shcheglov K. A., , , St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
Shcheglov A. Yu., , info@npp-itb.spb.ru, St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
- Keywords
- information security / allowed applications / malicious file / malicious functions / access control / file object / attack possibility / security level
- Year
- 2012 Issue 4 Pages 31 - 36
- Code EDN
- Code DOI
- Abstract
- This article is dedicated to the problem of malicious applications attacks (while reading malicious file). We suggest security methods based on access control to file objects appliance. Correctness requirements are formulated. Models of secure system are developed (in case of defending against reviewed attacks group).
- Text
- To obtain access to full text of journal and articles you must register!
- Buy