A hierarchical protection model for protecting against executable content

Takahiro Shinagawa, Kenji Kono, Takashi Masuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Computer Science and Technology
EditorsS. Sahni
Pages194-202
Number of pages9
Publication statusPublished - 2003 Dec 1
Externally publishedYes
EventProceedings of the IASTED International Conference on Computer Science and Technology - Cancun, Mexico
Duration: 2003 May 192003 May 21

Publication series

NameProceedings of the IASTED International Conference on Computer Science and Technology

Other

OtherProceedings of the IASTED International Conference on Computer Science and Technology
CountryMexico
CityCancun
Period03/5/1903/5/21

Keywords

  • Executable Content
  • Fine-grained Protection Domain
  • Operating System
  • Security

ASJC Scopus subject areas

  • Computer Science(all)
  • Development

Fingerprint Dive into the research topics of 'A hierarchical protection model for protecting against executable content'. Together they form a unique fingerprint.

  • Cite this

    Shinagawa, T., Kono, K., & Masuda, T. (2003). A hierarchical protection model for protecting against executable content. In S. Sahni (Ed.), Proceedings of the IASTED International Conference on Computer Science and Technology (pp. 194-202). (Proceedings of the IASTED International Conference on Computer Science and Technology).