History-based Access Control with Local Policies
|
|
|
- Martina Craig
- 10 years ago
- Views:
Transcription
1 Fossacs 05 p.1 History-based Access Control with Local Policies Massimo Bartoletti Pierpaolo Degano Gian-Luigi Ferrari Dipartimento di Informatica, Università di Pisa
2 Fossacs 05 p.2 Mobile code security victim.org Firewall attacker.com Browser Mail Server Hacker Applet read/write download applet upload applet File Server Web Server
3 Fossacs 05 p.2 Mobile code security victim.org Firewall attacker.com Browser Sandbox Applet read/write download applet Mail Server Hacker upload applet File Server Web Server
4 Fossacs 05 p.3 The present: stack inspection run-time privileges = intersection of the static permissions of each method in the call stack unclear which are the actual security goals attained (checks scattered through code) makes little sense in functional languages (requires the call stack made explicit) prevents from inter-procedural program optimizations (inlining, tail-call elimination) no protection after return (untrusted results)
5 Fossacs 05 p.4 Beyond stack inspection major issue: untrusted results instead of call stacks: the whole history the history is a side effect of programs instead of permissions: (regular) properties of histories instead of local checks: local policies to gain efficiency: static analysis History-based access control with local policies
6 Fossacs 05 p.5 Why local policies? Problem: securization of code upon receipt an untrusted program e is received I want the execution of e to obey a policy ϕ where to insert the checks in e? one issue: e could invoke unknown code solution: dynamic sandboxing ϕ[e] each execution step of e is subject to ϕ the scope of ϕ is left when e terminates
7 Fossacs 05 p.6 Overview A calculus for history-based access control: λ [ ] = λ + histories + local policies a history η is a sequence of events α a policy ϕ is a regular property of η a framing ϕ[e] localizes the scope of ϕ in e type & effect system to predict histories Optimizations: static verification via model checking, or instrumentation with local checks
8 Fossacs 05 p.7 The language λ [ ] (syntax) e, e ::= x α λ z x. e e e if b then e else e ϕ[e] variable access event abstraction application conditional safety framing λ. e = λ z x. e (z, x fv(e)) e; e = (λ. e )e
9 Fossacs 05 p.8 The language λ [ ] (semantics) η, e 1 η, e 1 η, e 1 e 2 η, e 1 e 2 η, e 2 η, e 2 η, v e 2 η, v e 2 η, (λ z x.e)v η, e{v/x, λ z x.e/z} η, α ηα, η, e η, e η = ϕ η = ϕ η, ϕ[e] η, ϕ[e ] η = ϕ η, ϕ[v] η, v
10 Fossacs 05 p.9 Programming in λ [ ] (1) R = λ. α r W = λ. α w C = λ. α c file Read/Write, socket Connection Browser = λu. λp. if html(u) then display(u) else if trusted(u) then p u else ϕ[p u; W ] ϕ = no connect after read site policy p = λx. ϕ [x ] user policy (a closure!) η, (λx. ϕ [x ]) λ.e η, ϕ [(λ.e) ] η, ϕ [e]
11 Fossacs 05 p.10 Programming in λ [ ] (2) ϕ = no write user policy Untrusted = λz. λ. Browser z (λy. y ) ε, Browser (Untrusted W ) (λy.ϕ [y ]) ε, ϕ[λy.ϕ [y ] (λ. BrowserW λy. y ); W ] ε, ϕ[ϕ [Browser W (λy. y )]; W ] ε, ϕ[ϕ [(λy. y )W ]; W ] ε, ϕ[ϕ [α w ]; W ] security exception! α w = ϕ
12 Fossacs 05 p.11 Programming in λ [ ] (3) ε, Browser (Untrusted (λ. R ; C )) (λy.ϕ [y ]) ε, ϕ[λy.ϕ [y ] (Untrusted (λ. R ; C )); W ] ε, ϕ[ϕ [Browser (λ. R ; C ) (λy. y )]; W ] ε, ϕ[ϕ [R ; C ]; W ] ε, ϕ[ϕ [α r ; C ]; W ] α r, ϕ[ϕ [C ]; W ] α r, ϕ[ϕ [α c ]; W ] security exception! α r α c = ϕ
13 Fossacs 05 p.12 Programming in λ [ ] (4) ε, Browser (Untrusted R) (λy.ϕ [y ]) ε, ϕ[(λy.ϕ [y ]) (Untrusted R); W ] ε, ϕ[ϕ [Browser R (λy. y )]; W ] ε, ϕ[ϕ [R ]; W ] α r, ϕ[ϕ [ ]; W ] α r, ϕ[w ] α r α w, ϕ[ ] α r α w,
14 Fossacs 05 p.13 Enforcing Principle of least privilege Programs should be granted the minimum set of rights that are needed to accomplish their tasks. an expression must always obey all the active policies (no policy can be overridden) policies can always inspect the whole past history (no event can be hidden) so how to implement privileged calls / discard the past? answer: policies must explicitly allow for it!
15 Fossacs 05 p.14 Extracting History Expressions e 1 = if b then α else α H 1 = α + α α, α
16 Fossacs 05 p.14 Extracting History Expressions e 1 = if b then α else α H 1 = α + α α, α e 2 = (λx. α ) : unit H 2 = ε α unit
17 Fossacs 05 p.14 Extracting History Expressions e 1 = if b then α else α H 1 = α + α α, α e 2 = (λx. α ) : unit H 2 = ε e 3 = (λx. α )α H 3 = α α αα α unit
18 Fossacs 05 p.14 Extracting History Expressions e 1 = if b then α else α H 1 = α + α α, α e 2 = (λx. α ) : unit H 2 = ε e 3 = (λx. α )α H 3 = α α αα α unit e 4 = (λy. ϕ[α; y ])(λx. ϕ [α ]) H 4 = ϕ[α ϕ [α ]] [ ϕ α[ ϕ α ] ϕ ] ϕ H 4 = αα
19 Fossacs 05 p.14 Extracting History Expressions e 1 = if b then α else α H 1 = α + α α, α e 2 = (λx. α ) : unit H 2 = ε e 3 = (λx. α )α H 3 = α α αα α unit e 4 = (λy. ϕ[α; y ])(λx. ϕ [α ]) H 4 = ϕ[α ϕ [α ]] [ ϕ α[ ϕ α ] ϕ ] ϕ H 4 = αα e 5 = (λ z x. α; z x) H 5 = µh. α h ε, α, αα,...
20 Fossacs 05 p.15 Type & Effect System typing judgements Γ, H e : τ types: τ ::= unit τ H τ effects: history expressions H correctness of history expressions: ε, e η, e = η prefix( H ) type safety: H valid = e will not go wrong
21 Fossacs 05 p.16 Validity of Histories obeying all the policies, within their scopes ex: ϕ[α r ]α c valid, ϕ[α r ϕ [α c ]α w ] not valid safe-sets of ϕ[α r ϕ [α c ]α w ]: ϕ[{α r, α r α c, α r α c α w }] ϕ [{α r α c }] η valid iff, for each safe-set ϕ[{η 1,..., η k }] of η: η i = ϕ H valid iff each η H 1 i k is valid
22 Fossacs 05 p.17 Verifying History Expressions If validity were a regular property... H BP A(H) Pushdown automaton validity Ψ(H) A Ψ(H) Büchi automaton H valid if L(BP A(H)) L(A Ψ(H) ) = But validity of histories is non-regular! ex: µh. α + h h + ϕ[h] in or out? solution: transform H to make Ψ(H) regular
23 Fossacs 05 p.18 Regularizing History Expressions (1) idea: eliminating the redundant framings ϕ[αϕ [α ϕ[α ]]] valid iff ϕ[αϕ [α α ]] valid the inner ϕ-framing is redundant elimination of non-regularity: H has no redundant framings preservation of validity: H valid H valid
24 Fossacs 05 p.19 Regularizing History Expressions (2) H Φ eliminates all the redundant framings, plus the framings in the set of policies Φ ex: H = ϕ[αϕ [α ϕ[α ]]] H = ϕ[(αϕ [α ϕ[α ]]) ϕ ] = ϕ[α(ϕ [α ϕ[α ]) ϕ ]] = ϕ[αϕ [(α ϕ[α ]) ϕ,ϕ ]] = ϕ[αϕ [α (ϕ[α ]) ϕ,ϕ ]] = ϕ[αϕ [α α ]]
25 Fossacs 05 p.20 Regularizing History Expressions (3) H = µh. α + h h + ϕ[h] H = µh. α + h h + ϕ[h ϕ ] = µh. α + h h + ϕ[(µh. α + h h + ϕ[h]) ϕ ] = µh. α + h h + ϕ[µh. α + h h + h ] trickier example: µh. µh. α + h ϕ[h ]
26 Fossacs 05 p.21 Büchi automata for validity α c α r α r, α c A ϕ q0 α r q1 α c q2 α r α c L(A ϕ ) α c α r α r, α c q0 α r q1 α c q2 A ϕ[ ] [ ϕ ] ϕ [ ϕ ] ϕ α r q0 q1 α c α r [ ϕ w ] ϕ = ϕ[w] α r [ ϕ α c ] ϕ L(A ϕ[ ] ) [ ϕ α r ] ϕ α c L(A ϕ[ ] )
27 Fossacs 05 p.22 Conclusions λ [ ] = λ + histories + local policies history expression H from e (type & effect) H has no redundant framings (regularization) η H valid iff η = ϕ [ ] ϕ η (Büchi automata) H valid BP A(H ) = ϕ H ϕ [ ] type safety + verification (model checking): Γ, H e : τ, H valid = e will not go wrong
28 Fossacs 05 p.23 Understanding History Inspection resource usage analysis [Colcombet & Fradet 00, Igarashi & Kobayashi 02, Marriott, Stuckey & Sulzmann 03] capability-based model [Abadi & Fournet 03] shallow histories [Fong 04] type & effect system [Skalka & Smith 04] relation with information flow [Banerjee & Naumann 04] membranes [Gorla, Hennessy & Sassone, 04] safety and liveness framing for secure service composition [Bartoletti, Degano & Ferrari 05]
29 Fossacs 05 p.24 A Type and Effect system for λ [ ] (1) Γ, ε x : Γ(x) Γ, α α : unit Γ, H e : τ Γ, ϕ[h] ϕ[e] : τ Γ, H e : τ Γ, H + H e : τ Γ, H e : τ Γ, H e : τ Γ, H if b then e else e : τ
30 Fossacs 05 p.25 A Type and Effect system for λ [ ] (2) Γ; x : τ; z : τ H τ, H e : τ Γ, ε λ z x.e : τ H τ Γ, H e : τ H τ Γ, H e : τ Γ, H H H ee : τ
31 Fossacs 05 p.26 A Type and Effect system for λ [ ] (3) e = λ z x. b? α + (b? zzx + ϕ[zx]) Γ, ε z : τ H τ Γ, ε x : τ Γ, H z x : τ Γ, H H z z x : τ Γ, ϕ[h] ϕ[z x] : τ Γ, H H + ϕ[h] z z x : τ Γ, H H + ϕ[h] ϕ[z x] : τ Γ, H H + ϕ[h] b? z z x + ϕ[z x] : τ Γ, α + H H + ϕ[h] b? α + (b? z z x + ϕ[z x]) : τ H = α + H H + ϕ[h] = H = µh. α + h h + ϕ[h], ε e : unit µh. α+h h+ϕ[h] unit
32 Fossacs 05 p.27 History Expressions (syntax) H, H ::= ε h α H H H + H ϕ[h] µh.h empty variable access event sequence choice safety framing recursion
33 Fossacs 05 p.28 History Expressions (semantics) ε ρ = ε α ρ = α h ρ = ρ(h) H H ρ = H ρ H ρ H + H ρ = H ρ H ρ ϕ[h] ρ = ϕ[ H ρ] µh.h ρ = n ω f n ( ), f(x) = H ρ{x/h}
34 Fossacs 05 p.29 Validity (alt. definition) plain histories + framing events [ ϕ and ] ϕ notation: [ ϕ η ] ϕ = ϕ[η] validity: [ ϕ α r ] ϕ α c valid, α r [ ϕ α c not valid η discards the framing events in η Φ(η) is the set of ϕ such that [ ϕ > ] ϕ in η β 1 β n is valid iff β 1 β k = Φ(β 1 β k ), for all k 1..n H valid iff each η H is valid
35 Fossacs 05 p.30 Regularizing history expressions (1) ε Φ,Γ = ε h Φ,Γ = h α Φ,Γ = α (H H ) Φ,Γ = H Φ,Γ H Φ,Γ (H + H ) Φ,Γ = H Φ,Γ + H Φ,Γ ϕ[h] Φ,Γ = { H Φ,Γ ϕ[h Φ {ϕ},γ ] if ϕ Φ otherwise
36 Fossacs 05 p.31 Regularizing history expressions (2) (µh. H) Φ,Γ = µh. (H σ Φ,Γ{(µh.H)Γ/h} σ) where H = H {h/h i } i, h i fresh, h fv(h ) σ(h i ) = (µh.h)γ Φ guard(hi,h ),Γ σ (h i ) = { h h i if guard(h i, H ) Φ otherwise
37 Fossacs 05 p.32 Büchi automaton for ϕ [ ] A ϕ[ ] = Σ, Q, Q 0, ρ, F Σ = Σ { [ ϕ, ] ϕ ϕ Π } Q = F = Q { q q F } ρ = ρ { q, [ ϕ, q q F } { q, ] ϕ, q } { q 0, α, q 1 q 0, α, q 1 ρ and q 1 F } { q, [ ϕ, q q, ] ϕ, q q Q and ϕ ϕ }
38 Fossacs 05 p.33 Conclusions λ [ ] = λ + histories + local policies history expression H from e (type & effect) H has no redundant framings (regularization) η H valid iff η = ϕ [ ] ϕ η (Büchi automata) H valid BP A(H ) = ϕ H ϕ [ ] type safety + verification (model checking): Γ, H e : τ, H valid = e will not go wrong
Secure Web Service Using Call by Contract
Secure Web Service Using Call by Contract R.Ashitha Department of Computer Science Engineering Anna University Tiruchirappalli, Tamilnadu, India Abstract A methodology for designing and composing services
Fabio Massacci Ida Siahaan
Inline-Reference Monitor Optimization using Automata Modulo Theory (AMT) Fabio Massacci Ida Siahaan 2009-09-24 STM09 - UNITN - Siahaan 1 Inlined Reference Monitors Security Policy Original Application
Deterministic Discrete Modeling
Deterministic Discrete Modeling Formal Semantics of Firewalls in Isabelle/HOL Cornelius Diekmann, M.Sc. Dr. Heiko Niedermayer Prof. Dr.-Ing. Georg Carle Lehrstuhl für Netzarchitekturen und Netzdienste
Chapter 7: Functional Programming Languages
Chapter 7: Functional Programming Languages Aarne Ranta Slides for the book Implementing Programming Languages. An Introduction to Compilers and Interpreters, College Publications, 2012. Fun: a language
Dynamic Process/Service Composition/Combination
INFINT 2009 - Bertinoro Workshop on Data and Service Integration Bertinoro, March 15-20, 2009 Dynamic Process/Service Composition/Combination Ugo Montanari Dipartimento di Informatica Università di Pisa
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Software Model Checking: Theory and Practice
Software Model Checking: Theory and Practice Lecture: Specification Checking - LTL Model Checking Copyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are
Cofred Automated Payments Interface (API) Guide
Cofred Automated Payments Interface (API) Guide For use by Cofred Merchants. This guide describes how to connect to the Automated Payments Interface (API) www.cofred.com Version 1.0 Copyright 2015. Cofred.
How Program Monitors Enforce Non-Safety
Enforcing Non-safety Security Policies with Program Monitors Jay Ligatti 1,LujoBauer 2,andDavidWalker 1 1 Department of Computer Science, Princeton University 2 CyLab, Carnegie Mellon University Abstract.
FF/EDM Intro Industry Goals/ Purpose Related GISB Standards (Common Codes, IETF) Definitions d 4 d 13 Principles p 6 p 13 p 14 Standards s 16 s 25
FF/EDM Intro Industry Goals/ Purpose GISB defined two ways in which flat files could be used to send transactions and transaction responses: interactive and batch. This section covers implementation considerations
WA2102 Web Application Programming with Java EE 6 - WebSphere 8.5 - RAD 8.5. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.
WA2102 Web Application Programming with Java EE 6 - WebSphere 8.5 - RAD 8.5 Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
RE-TRUST Design Alternatives on JVM
RE-TRUST Design Alternatives on JVM ( - Italy) [email protected] http://softeng.polito.it/falcarin Trento, December, 19 th 2006 Tamper-Detection Tamper-detection goals Detect malicious modifications
Linear Types for Continuations
1/28 Linear Types for Continuations Alex Simpson LFCS, School of Informatics University of Edinburgh, UK Joint work with: Jeff Egger (LFCS, Edinburgh) Rasmus Møgelberg (ITU, Copenhagen) Linear Types for
Programming Language Pragmatics
Programming Language Pragmatics THIRD EDITION Michael L. Scott Department of Computer Science University of Rochester ^ШШШШШ AMSTERDAM BOSTON HEIDELBERG LONDON, '-*i» ЩЛ< ^ ' m H NEW YORK «OXFORD «PARIS»SAN
Trust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
Securing the Bring Your Own Device Policy
Securing the Bring Your Own Device Policy Alessandro Armando Fondazione Bruno Kessler Trento, Italy [email protected] Gabriele Costa Università degli Studi di Genova Genova, Italy [email protected]
Honors Class (Foundations of) Informatics. Tom Verhoeff. Department of Mathematics & Computer Science Software Engineering & Technology
Honors Class (Foundations of) Informatics Tom Verhoeff Department of Mathematics & Computer Science Software Engineering & Technology www.win.tue.nl/~wstomv/edu/hci c 2011, T. Verhoeff @ TUE.NL 1/20 Information
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
Agenda. SQL Injection Impact in the Real World. 8.1. Attack Scenario (1) CHAPTER 8 SQL Injection
Agenda CHAPTER 8 SQL Injection Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN 1590597842; http://www.foundationsofsecurity.com).
Monitoring Networks through Multiparty Session Types
Monitoring Networks through Multiparty Session Types Laura Bocchi 1, Tzu-Chun Chen 2, Romain Demangeon 1, Kohei Honda 2, Nobuko Yoshida 1 2 Queen Mary, University of London, 1 Imperial College, London
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Semantics and Verification of Software
Semantics and Verification of Software Lecture 21: Nondeterminism and Parallelism IV (Equivalence of CCS Processes & Wrap-Up) Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification)
Security Vulnerability Notice
Security Vulnerability Notice SE-2014-01-ORACLE [Security vulnerabilities in Oracle Database Java VM, Issues 1-20] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY
OHIO S EAUDIT PROCESSES RON POTTORF, EXECUTIVE ADMINISTRATOR OHIO DEPARTMENT OF TAXATION AUDIT DIVISION
OHIO S EAUDIT PROCESSES RON POTTORF, EXECUTIVE ADMINISTRATOR OHIO DEPARTMENT OF TAXATION AUDIT DIVISION File Structure within OFAST File structure viewed through Index Viewer Red Folders note empty Expanded
MMLIST Listserv User's Guide for ICORS.ORG
MMLIST Listserv User's Guide for ICORS.ORG 12/12/06 Version 1.1 To Send Mail to the Listserv: [email protected] Only Subscribed Users can send mail to the Listserv. Anyone can have a Subscription.
Emails sent to the FaxFinder fax server must meet the following criteria to be processed for sending as a fax:
FaxFinder FFx30 T.37 Store & Forward Fax (T.37) Introduction The FaxFinder implements T.37 Store and Forward Fax (RFC2304) to convert emails into facsimile transmissions. The FaxFinder fax server accepts
Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Participant Guide RP301: Ad Hoc Business Intelligence Reporting
RP301: Ad Hoc Business Intelligence Reporting State of Kansas As of April 28, 2010 Final TABLE OF CONTENTS Course Overview... 4 Course Objectives... 4 Agenda... 4 Lesson 1: Reviewing the Data Warehouse...
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
IP Configuration Manual
IP Configuration Manual Safety precautions and warnings Thank you for deciding to use a Frama Franking System. The information in this guide is intended to support you during the configuration of the franking
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Redpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
How to Configure and Test QoS in PANOS 3.0
How to Configure and Test QoS in PANOS 3.0 This document walks through the steps needed for a simple test of the QoS feature. In particular, these steps will rate-limit applications such as youtube, hulu,
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
netkit lab bgp: prefix-filtering Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: prefix-filtering Version Author(s) E-mail Web Description 2.1 G. Di Battista,
Fundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
DreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
From Bytecode to Javascript: the Js of ocaml Compiler
From Bytecode to Javascript: the Js of ocaml Compiler Jérôme Vouillon PPS, University Paris Diderot and CNRS [email protected] Vincent Balat PPS, University Paris Diderot and INRIA [email protected]
Pushdown Automata. International PhD School in Formal Languages and Applications Rovira i Virgili University Tarragona, Spain
Pushdown Automata transparencies made for a course at the International PhD School in Formal Languages and Applications Rovira i Virgili University Tarragona, Spain Hendrik Jan Hoogeboom, Leiden http://www.liacs.nl/
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Going Above and Beyond
Whitepaper Going Above and Beyond Using Advanced Techniques to Create Customized HTML Templates August 3, 2010 Copyright 2010 L-Soft international, Inc. Information in this document is subject to change
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the
How to configure HTTPS proxying in Zorp 5
How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Rigorous Software Development CSCI-GA 3033-009
Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
Understanding Precision in Host Based Intrusion Detection
Understanding Precision in Host Based Intrusion Detection Formal Analysis and Practical Models Monirul Sharif, Kapil Singh, Jonathon Giffin, and Wenke Lee School of Computer Science, Georgia Institute
JAVA 2 Network Security
JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface
Opening Balances Process for a business that is VAT registered using the standard scheme or is NOT VAT registered
Opening Balances Process for a business that is VAT registered using the standard scheme or is NOT VAT registered Correct opening balances are the key to bookkeeping activities. If you do not enter them
1 An application in BPC: a Web-Server
1 An application in BPC: a Web-Server We briefly describe our web-server case-study, dwelling in particular on some of the more advanced features of the BPC framework, such as timeouts, parametrized events,
Unified Static and Runtime Verification of Object-Oriented Software
Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: +966 12 739 894 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training is designed to
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
USER GUIDE MANTRA WEB EXTRACTOR. www.altiliagroup.com
USER GUIDE MANTRA WEB EXTRACTOR www.altiliagroup.com Page 1 of 57 MANTRA WEB EXTRACTOR USER GUIDE TABLE OF CONTENTS CONVENTIONS... 2 CHAPTER 2 BASICS... 6 CHAPTER 3 - WORKSPACE... 7 Menu bar 7 Toolbar
Opendiem Training Exercise 1 Opendiem-TRN-0001
Opendiem Training Exercise 1 Revision 5.0.0 Status Initials Date Comment Released RAC 11/12/2010 Updated format and content Exercise 1 - Accessing the Opendiem Server through a Standard Web Browser Introduction
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Communication Diagrams
Communication Diagrams Massimo Felici Realizing Use cases in the Design Model 1 Slide 1: Realizing Use cases in the Design Model Use-case driven design is a key theme in a variety of software processes
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
Attach receipt options:
Attaching Receipts and Receipt Store There are a few ways to attach receipts to an expense report. You will only need to choose one of the following options when attaching receipts. You can add receipts
Java and Java Virtual Machine Security
Java and Java Virtual Machine Security Vulnerabilities and their Exploitation Techniques by Last Stage of Delirium Research Group http://lsd-pl.net Version: 1.0.0 Updated: October 2nd, 2002 Copyright c
Oracle Database: Program with PL/SQL
Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn This Oracle Database: Program with PL/SQL training starts with an introduction to PL/SQL and then explores the benefits of this
How To Use Exchange Reporter Plus On A Microsoft Mailbox On A Windows 7 2.6.2 (Windows) On A Server Or Ipa (Windows 7) On An Ubuntu 7.6 (Windows 8) On Your Pc Or
Quick Configuration Guide For Exchange Reporter Plus 1 Table of Contents Contents Page No. 1. Exchange Reporter Plus Overview 3 2. System Requirements Hardware Requirements Software Requirements Supported
Deploying Secure Internet Connectivity
C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4
CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,
Runtime Verification for Real-Time Automotive Embedded Software
Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
