期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Reduce Malicious Activity in Trusted Programs
1
作者 elliot ito Depeng Li 《Journal of Computer and Communications》 2022年第10期34-49,共16页
The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either ... The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either outside of the system or are implemented in a manner that is unintuitive or confusing to users. In this paper, an access control method has been proposed that focuses on the alleviation of damage caused by such applications through the interactions between the user, application, and computer system. In details, the proposed model would work as a module or an interceptor to delegate permissions to applications through user input by using existing system calls. The evaluation about the proposed model as well as the first step implementation can show better security protection than existing systems. 展开更多
关键词 Malicious Activity
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部