Publication | Closed Access
SASI enforcement of security policies
251
Citations
12
References
1999
Year
Unknown Venue
EngineeringInformation SecurityComputer ArchitectureSoftware AnalysisFormal VerificationHardware SecurityIntel X86Trusted Execution EnvironmentSecure ComputingSecurity ManagementOperating System SecurityComputer EngineeringData PrivacySasi ApproachSecure By DesignComputer ScienceLanguage-based SecurityData SecurityProgram AnalysisSecurityTarget SystemSecurity MeasurementSystem SoftwareComputer Security ModelSasi Enforcement
SASI enforces security policies by modifying object code for a target system before that system is executed. The approach has been prototyped for two rather dieren t machine architectures: Intel x86 and Java JVML. Details of these prototypes and some generalizations about the SASI approach are discussed.
| Year | Citations | |
|---|---|---|
Page 1
Page 1