Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions

SK Fayazbakhsh, V Sekar, M Yu… - Proceedings of the second …, 2013 - dl.acm.org
Past studies show that middleboxes are a critical piece of network infrastructure for providing
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …

Data loss prevention based on data-driven usage control

T Wüchner, A Pretschner - 2012 IEEE 23rd International …, 2012 - ieeexplore.ieee.org
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …

[PDF][PDF] {SilverLine}: Data and Network Isolation for Cloud Services

Y Mundada, A Ramachandran… - 3rd USENIX Workshop on …, 2011 - usenix.org
Although cloud computing service providers offer opportunities for improving the
administration, reliability, and maintenance of hosted services, they also concentrate …

A host based method for data leak protection by tracking sensitive data flow

M Petkovic, M Popovic, I Basicevic… - 2012 IEEE 19th …, 2012 - ieeexplore.ieee.org
This paper describes a method for data leak protection (DLP) based on tracking sensitive
information as it flows inside file system on a host. The method is based on the idea that …

[BOG][B] Safeguarding health data with enhanced accountability and patient awareness

D Mashima - 2012 - search.proquest.com
Several factors are driving the transition from paper-based health records to electronic
health record systems. In the United States, the adoption rate of electronic health record …

On-the-Fly Encryption Security in Remote Storage

A Prabhakar, PS Savin… - 2015 Fifth International …, 2015 - ieeexplore.ieee.org
Development of distributed storage, cell phones, furthermore, removable hard drives have
expanded the versatility of usage of information. On the other hand, there emerges a few …

A basis for intrusion detection in distributed systems using kernel-level data tainting.

C Hauser - 2013 - theses.hal.science
Modern organisations rely intensively on information and communicationtechnology
infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport …

[PDF][PDF] Analysis and Experiences with Information Flow Tracking as a Practical Means to Prevent Data Leakage

LL Fowler - Electical Engineering and Computer Sciences, 2011 - digicoll.lib.berkeley.edu
Data leakage is a primary concern for companies and governmental agencies, for which
information flow is means for mitigation. A popular technique used for evaluating pre …

[PDF][PDF] THE ROLE OF ENTERPRISE SECURITY SYSTEM IN DATA PROTECTION

C EJIOFOR, CI UNEKWE, C NNADOZIE - fcetumunze.edu.ng
Abstract This paper discusses Enterprise Security System. It is understood that Enterprise
Security System plays a vital role in protection of vital data and documents in Establishment …

Reasoning about Stateful Network Behaviors

SK Fayaz - 2017 - search.proquest.com
Network operators must ensure their networks meet intended traversal policies (eg, host A
can talk to host B, or inbound traffic to host C goes through a firewall and then a NAT) …