Parkinson et al., 2019 - Google Patents
Creeper: a tool for detecting permission creep in file system access controlsParkinson et al., 2019
View HTML- Document ID
- 1875728402563946811
- Author
- Parkinson S
- Khan S
- Bray J
- Shreef D
- Publication year
- Publication venue
- Cybersecurity
External Links
Snippet
Access control mechanisms are widely used in multi-user IT systems where it is necessary to restrict access to computing resources. This is certainly true of file systems whereby information needs to be protected against unintended access. User permissions often …
- 241000219098 Parthenocissus 0 title abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11405400B2 (en) | Hardening based on access capability exercise sufficiency | |
| EP4059203B1 (en) | Collaborative filtering anomaly detection explainability | |
| US12381876B2 (en) | Anomaly-based mitigation of access request risk | |
| US11704431B2 (en) | Data security classification sampling and labeling | |
| US11178182B2 (en) | Automated access control management for computing systems | |
| Aliero et al. | An algorithm for detecting SQL injection vulnerability using black-box testing | |
| US11310257B2 (en) | Anomaly scoring using collaborative filtering | |
| US11106789B2 (en) | Dynamic cybersecurity detection of sequence anomalies | |
| EP3921750B1 (en) | Dynamic cybersecurity peer identification using groups | |
| Parkinson et al. | A survey on empirical security analysis of access-control systems: a real-world perspective | |
| Shaikh et al. | A data classification method for inconsistency and incompleteness detection in access control policy sets | |
| US12111747B1 (en) | Dynamic input-sensitive validation of machine learning model outputs and methods and systems of the same | |
| Das et al. | Baaz: A system for detecting access control misconfigurations | |
| Sawadogo et al. | SSPCatcher: Learning to catch security patches | |
| Han et al. | An effective evolutionary analysis scheme for industrial software access control models | |
| Parkinson et al. | Creeper: a tool for detecting permission creep in file system access controls | |
| Abo-Alian et al. | A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation | |
| Wang et al. | SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation | |
| Shen | A survey of access control misconfiguration detection techniques | |
| Iyer et al. | Towards automated learning of access control policies enforced by web applications | |
| Izergin et al. | Risky model of mobile application presentation | |
| US12314288B2 (en) | Data scan sampling control for data discovery and posture management | |
| US20250321857A1 (en) | Dynamic input-sensitive validation of machine learning model outputs and methods and systems of the same | |
| Sanders | Automated methods for generating least privilege access control policies | |
| Amour¹ et al. | Access Policy Prediction via User |