Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions
Past studies show that middleboxes are a critical piece of network infrastructure for providing
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …
Data loss prevention based on data-driven usage control
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …
corporate information security. Data loss prevention systems typically try to cope with this …
[PDF][PDF] {SilverLine}: Data and Network Isolation for Cloud Services
Although cloud computing service providers offer opportunities for improving the
administration, reliability, and maintenance of hosted services, they also concentrate …
administration, reliability, and maintenance of hosted services, they also concentrate …
A host based method for data leak protection by tracking sensitive data flow
This paper describes a method for data leak protection (DLP) based on tracking sensitive
information as it flows inside file system on a host. The method is based on the idea that …
information as it flows inside file system on a host. The method is based on the idea that …
[BOG][B] Safeguarding health data with enhanced accountability and patient awareness
D Mashima - 2012 - search.proquest.com
Several factors are driving the transition from paper-based health records to electronic
health record systems. In the United States, the adoption rate of electronic health record …
health record systems. In the United States, the adoption rate of electronic health record …
On-the-Fly Encryption Security in Remote Storage
A Prabhakar, PS Savin… - 2015 Fifth International …, 2015 - ieeexplore.ieee.org
Development of distributed storage, cell phones, furthermore, removable hard drives have
expanded the versatility of usage of information. On the other hand, there emerges a few …
expanded the versatility of usage of information. On the other hand, there emerges a few …
A basis for intrusion detection in distributed systems using kernel-level data tainting.
C Hauser - 2013 - theses.hal.science
Modern organisations rely intensively on information and communicationtechnology
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …
[PDF][PDF] Analysis and Experiences with Information Flow Tracking as a Practical Means to Prevent Data Leakage
LL Fowler - Electical Engineering and Computer Sciences, 2011 - digicoll.lib.berkeley.edu
Data leakage is a primary concern for companies and governmental agencies, for which
information flow is means for mitigation. A popular technique used for evaluating pre …
information flow is means for mitigation. A popular technique used for evaluating pre …
[PDF][PDF] THE ROLE OF ENTERPRISE SECURITY SYSTEM IN DATA PROTECTION
C EJIOFOR, CI UNEKWE, C NNADOZIE - fcetumunze.edu.ng
Abstract This paper discusses Enterprise Security System. It is understood that Enterprise
Security System plays a vital role in protection of vital data and documents in Establishment …
Security System plays a vital role in protection of vital data and documents in Establishment …
Reasoning about Stateful Network Behaviors
SK Fayaz - 2017 - search.proquest.com
Network operators must ensure their networks meet intended traversal policies (eg, host A
can talk to host B, or inbound traffic to host C goes through a firewall and then a NAT) …
can talk to host B, or inbound traffic to host C goes through a firewall and then a NAT) …