CoryXie

一垄青竹映陋室,半枝桃花衬碧窗。

  :: :: 博问 :: 闪存 :: 新随笔 :: :: 订阅 订阅 :: 管理 ::

随笔分类 -  Security Concerns

上一页 1 2

摘要:The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone conne... 阅读全文
posted @ 2014-08-26 23:22 CoryXie

摘要:A computing system is operable to contain a security module within an operating system. This security module may then act to monitoraccessrequests by a web browser and applymandatoryaccesscontrol... 阅读全文
posted @ 2014-08-25 17:31 CoryXie

摘要:The present invention relates to the field of security of electronic data and/or communications. In one form, the invention relates to data security and/or privacy in a distributed and/or decentralise... 阅读全文
posted @ 2014-08-25 17:14 CoryXie

摘要:1. INTRODUCTION The main goal of the National Computer Security Center is to encourage the widespread availability of trusted computer systems. In support of that goal a metric was created, the Depa... 阅读全文
posted @ 2014-08-24 22:49 CoryXie

摘要:AMandatoryAccessControl(MAC) aware firewall includes an extended rule set for MAC attributes, such as a security label or path. Application labels may be used to identify processes and perform fir... 阅读全文
posted @ 2014-08-23 21:22 CoryXie

摘要:A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to deve... 阅读全文
posted @ 2014-08-22 23:01 CoryXie

摘要:本发明公开一种支持跨平台统一管理的自主访问控制系统,包括安全管理中心,安全管理中心管理不同操作系统的服务器和连接服务器的计算机终端,所述的安全管理中心还包括用于管理实施对计算环境、区域边界和通信网络统一的自主访问控制安全策略模块、系统安全策略模块以及审计模块,所述自主访问控制安全策略模块包括主客体标记模块和自主访问控制模块,所述自主访问控制模块调用主客体标记模块判断主体访问请求。本发明通过自主访问... 阅读全文
posted @ 2014-08-20 00:44 CoryXie

摘要:Disclosed herein is a Residential Gateway (RG) system for home network service. The RG system receives various supplementary services through a Home Network Serving Node (HNSN) that provides home netw... 阅读全文
posted @ 2014-08-18 18:58 CoryXie

摘要:1 Protection Profile Introduction This document defines the security functionality expected to be provided by a general-purpose operating system capable of operating in a networked environment. ... 阅读全文
posted @ 2014-08-17 23:55 CoryXie

摘要:Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a p... 阅读全文
posted @ 2014-08-17 17:14 CoryXie

摘要:A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control... 阅读全文
posted @ 2014-08-17 15:40 CoryXie

摘要:Cross-domain security for data vault is described. At least one database is accessible from a plurality of network domains, each network domain having a domain security level. The at least one databas... 阅读全文
posted @ 2014-08-17 15:30 CoryXie

摘要:A system for providing security policy for a Linux-based security operating system, which includes a template policy module configured to set an authority using policy information of a downloaded appl... 阅读全文
posted @ 2014-08-15 01:01 CoryXie

摘要:A system switches between non-secure and secure modes by making processes, applications, and data for the non-secure mode unavailable to the secure mode and vice versa. The process thread run queue is... 阅读全文
posted @ 2014-08-07 11:32 CoryXie

摘要:Embodiments of the present invention address deficiencies of the art in respect to secure communications for multiple hosts in an address translation environment and provide a method, system and compu... 阅读全文
posted @ 2014-08-04 23:54 CoryXie

摘要:Methods, systems, and products for governing access to objects on a filesystem. In one general embodiment, the method includes providing a framework in an operating system environment for support of a... 阅读全文
posted @ 2014-08-03 18:04 CoryXie

摘要:A method, a system, an apparatus, and a computer program product are presented for an authentication process. A host application or system within a distributed data processing system supports one or m... 阅读全文
posted @ 2014-08-03 17:42 CoryXie

摘要:Enabling discretionary data access control in a cloud computing environment can begin with the obtainment of a data request and response message by an access manager service. The response message can ... 阅读全文
posted @ 2014-08-02 23:41 CoryXie

摘要:The Complete Diffie-Hellman Key Exchange Diagram The process begins when each side of the communication generates a private key. Each side then generates a public key (letter B), which is a derivative... 阅读全文
posted @ 2014-07-20 22:39 CoryXie

上一页 1 2