[go: up one dir, main page]

Parkinson et al., 2019 - Google Patents

Creeper: a tool for detecting permission creep in file system access controls

Parkinson et al., 2019

View HTML @Full View
Document ID
1875728402563946811
Author
Parkinson S
Khan S
Bray J
Shreef D
Publication year
Publication venue
Cybersecurity

External Links

Snippet

Access control mechanisms are widely used in multi-user IT systems where it is necessary to restrict access to computing resources. This is certainly true of file systems whereby information needs to be protected against unintended access. User permissions often …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
US11405400B2 (en) Hardening based on access capability exercise sufficiency
EP4059203B1 (en) Collaborative filtering anomaly detection explainability
US12381876B2 (en) Anomaly-based mitigation of access request risk
US11704431B2 (en) Data security classification sampling and labeling
US11178182B2 (en) Automated access control management for computing systems
Aliero et al. An algorithm for detecting SQL injection vulnerability using black-box testing
US11310257B2 (en) Anomaly scoring using collaborative filtering
US11106789B2 (en) Dynamic cybersecurity detection of sequence anomalies
EP3921750B1 (en) Dynamic cybersecurity peer identification using groups
Parkinson et al. A survey on empirical security analysis of access-control systems: a real-world perspective
Shaikh et al. A data classification method for inconsistency and incompleteness detection in access control policy sets
US12111747B1 (en) Dynamic input-sensitive validation of machine learning model outputs and methods and systems of the same
Das et al. Baaz: A system for detecting access control misconfigurations
Sawadogo et al. SSPCatcher: Learning to catch security patches
Han et al. An effective evolutionary analysis scheme for industrial software access control models
Parkinson et al. Creeper: a tool for detecting permission creep in file system access controls
Abo-Alian et al. A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation
Wang et al. SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation
Shen A survey of access control misconfiguration detection techniques
Iyer et al. Towards automated learning of access control policies enforced by web applications
Izergin et al. Risky model of mobile application presentation
US12314288B2 (en) Data scan sampling control for data discovery and posture management
US20250321857A1 (en) Dynamic input-sensitive validation of machine learning model outputs and methods and systems of the same
Sanders Automated methods for generating least privilege access control policies
Amour¹ et al. Access Policy Prediction via User