Now showing items 1-2 of 2
Improving host-based computer security using secure active monitoring and memory analysis
(Georgia Institute of Technology, 2010-06-03)
Thirty years ago, research in designing operating systems to defeat malicious software was very popular. The primary technique was to design and implement a small security kernel that could provide security assurances to ...
Flexible access control for campus and enterprise networks
(Georgia Institute of Technology, 2010-04-07)
We consider the problem of designing enterprise network security systems which are easy to manage, robust and ﬂexible. This problem is challenging. Today, most approaches rely on host security, middleboxes, and complex ...