A hierarchical protection model for protecting against executable content

Takahiro Shinagawa, Kenji Kono, Takashi Masuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Computer Science and Technology
EditorsS. Sahni
Pages194-202
Number of pages9
Publication statusPublished - 2003
Externally publishedYes
EventProceedings of the IASTED International Conference on Computer Science and Technology - Cancun, Mexico
Duration: 2003 May 192003 May 21

Other

OtherProceedings of the IASTED International Conference on Computer Science and Technology
CountryMexico
CityCancun
Period03/5/1903/5/21

Fingerprint

Defects
Access control
threat
programme
code

Keywords

  • Executable Content
  • Fine-grained Protection Domain
  • Operating System
  • Security

ASJC Scopus subject areas

  • Development
  • Computer Science(all)

Cite this

Shinagawa, T., Kono, K., & Masuda, T. (2003). A hierarchical protection model for protecting against executable content. In S. Sahni (Ed.), Proceedings of the IASTED International Conference on Computer Science and Technology (pp. 194-202)

A hierarchical protection model for protecting against executable content. / Shinagawa, Takahiro; Kono, Kenji; Masuda, Takashi.

Proceedings of the IASTED International Conference on Computer Science and Technology. ed. / S. Sahni. 2003. p. 194-202.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shinagawa, T, Kono, K & Masuda, T 2003, A hierarchical protection model for protecting against executable content. in S Sahni (ed.), Proceedings of the IASTED International Conference on Computer Science and Technology. pp. 194-202, Proceedings of the IASTED International Conference on Computer Science and Technology, Cancun, Mexico, 03/5/19.
Shinagawa T, Kono K, Masuda T. A hierarchical protection model for protecting against executable content. In Sahni S, editor, Proceedings of the IASTED International Conference on Computer Science and Technology. 2003. p. 194-202
Shinagawa, Takahiro ; Kono, Kenji ; Masuda, Takashi. / A hierarchical protection model for protecting against executable content. Proceedings of the IASTED International Conference on Computer Science and Technology. editor / S. Sahni. 2003. pp. 194-202
@inproceedings{a3d638c5b538405a8b9d073afb0457b6,
title = "A hierarchical protection model for protecting against executable content",
abstract = "Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.",
keywords = "Executable Content, Fine-grained Protection Domain, Operating System, Security",
author = "Takahiro Shinagawa and Kenji Kono and Takashi Masuda",
year = "2003",
language = "English",
isbn = "0889863490",
pages = "194--202",
editor = "S. Sahni",
booktitle = "Proceedings of the IASTED International Conference on Computer Science and Technology",

}

TY - GEN

T1 - A hierarchical protection model for protecting against executable content

AU - Shinagawa, Takahiro

AU - Kono, Kenji

AU - Masuda, Takashi

PY - 2003

Y1 - 2003

N2 - Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.

AB - Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.

KW - Executable Content

KW - Fine-grained Protection Domain

KW - Operating System

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=1542537667&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=1542537667&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:1542537667

SN - 0889863490

SN - 9780889863491

SP - 194

EP - 202

BT - Proceedings of the IASTED International Conference on Computer Science and Technology

A2 - Sahni, S.

ER -