• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,766
Next 10 →

Table 2 Threat levels The classification in Table 2 corresponds to a threat hierarchy, since a system call classification at threat level n may be employed also to carry on an attack at threat level m if m gt;n. For example, if a system call allows the attacker to gain access to a privilege shell, then the attacker has full control of the system (threat level 1). In this case it is trivial to carry on a Denial of Service attack (threat level 2) [11]. The attacker now has the ability to e.g. shut down a process.

in A system for collection and analysis of forensic evidence Forfatter/Author:
by Jerker Danielsson, Knut Håkon, T. Mørch, Jerker Danielsson, Knut Håkon, Tolleshaug Mørch, Per Røe 2003
"... In PAGE 21: ...sed in the Linux kernel 2.2. In [11], the system calls have been grouped in categories according to their functionality, as presented in Table 1. In addition, they classified each system call according to Table2 , which portrays the essential features of the four levels of threat they consider. Group Functionality I File system, devices II Process management III Module management IV Memory management V Time and timers VI Communication VII System info VIII Reserved IX ... ..."

Table 2: DAC Privileges

in Formal Specification of
by Operating System Operations, Dan Zhou, Paul E. Black
"... In PAGE 4: ... These are enumerated types that list all group-specific privileges. For example, the subgroup for DAC privilege contains the twelve privileges that subjects can possess for bypassing DAC- related constraints ( Table2 ). The DACPriv represents the DAC privilege group: DACPriv = PV_DAC | PV_DAC_GID | PV_DAC_O | PV_DAC_O_NS | PV_DAC_R | PV_DAC_R_NS | PV_DAC_SIG | PV_DAC_UID | PV_DAC_W | PV_DAC_W_NS | PV_DAC_X | PV_DAC_X_NS; Other general privilege subgroups are defined similarly.... ..."

TABLE_PRIVILEGES

in Federal Information Processing Standards Publication Xxx
by Draft April Announcing

TABLE_PRIVILEGES

in Federal Information Processing Standards Publication Xxx
by Draft April Announcing

TABLE_PRIVILEGES

in Federal Information Processing Standards Publication Xxx
by Draft April

TABLE_PRIVILEGES

in Federal Information Processing Standards Publication Xxx
by Draft April

Table 1: General System Privileges

in Towards the Formal Modeling of a Secure Operating System
by Dan Zhou Department, Dan Zhou 2000
"... In PAGE 6: ... A process with privilege PV DAC has all the privileges related to DAC; a process with privilege PV ROOT has all the general privileges, including PV DAC. A general privilege is one of the privileges listed in Table1... ..."
Cited by 1

Table 1: General System Privileges

in Towards the Formal Modeling of a Secure Operating System
by Dan Zhou 2000
"... In PAGE 6: ... A process with privilege PV DAC has all the privileges related to DAC; a process with privilege PV ROOT has all the general privileges, including PV DAC. A general privilege is one of the privileges listed in Table1 or PV ROOT. It is defined in HOL as follows:... ..."
Cited by 1

Table 1. General System Privileges

in Formal Specification of Operating System Operations
by Dan Zhou, Paul E. Black
"... In PAGE 2: ... There are three groups of privileges implemented on the PITBULL system: general privileges, X-Window privi- leges, and superuser privileges (denoted by Priv, XPriv, and SUPriv, respectively). The general privileges are organized into eight functionality sub-groups ( Table1 ). Table 1 lists the number of privileges in each sub-group.... In PAGE 2: ... We define one data type in HOL for each group to denote the group specific privileges. A general privilege is either one of the privileges listed in Table1 or PV ROOT. A privilege is either a general privilege, or an X-Window privilege, or a superuser privilege.... ..."

Table 1. General System Privileges

in Formal Specification of Operating System Operations
by Dan Zhou Florida, Dan Zhou, Paul E. Black
"... In PAGE 2: ... There are three groups of privileges implemented on the PITBULL system: general privileges, X-Window privi- leges, and superuser privileges (denoted by Priv, XPriv, and SUPriv, respectively). The general privileges are organized into eight functionality sub-groups ( Table1 ). Table 1 lists the number of privileges in each sub-group.... In PAGE 2: ... We define one data type in HOL for each group to denote the group specific privileges. A general privilege is either one of the privileges listed in Table1 or PV ROOT. A privilege is either a general privilege, or an X-Window privilege, or a superuser privilege.... ..."
Next 10 →
Results 1 - 10 of 10,766
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University