2017
DOI: 10.1007/978-3-319-61176-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Reference Monitor for Distributed Access Control via Moving Target Defense

Abstract: Effective access control is dependent not only on the existence of strong policies but also on ensuring that the access control enforcement subsystem is adequately protected. Protecting this subsystem has not been adequately addressed in the literature. In general, it is assumed to be implemented as a reference monitor in a trusted computing base (TCB) that is tamper-proof. However, in distributed access control, ensuring TCB security kernel to be tamper proof is not always feasible. It needs to be implemented… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…Moving-Target Defense (MTD) is a popular example of proactive defense. Many MTD techniques have been proposed (see, e.g., [90] and the numerous references therein) and many aspects of MTD have been investigated (see, e.g., [52,103,77,25,84]). However, very few studies have aimed at systematically quantifying the effectiveness of MTD.…”
Section: Proactive Cyber Defense Dynamicsmentioning
confidence: 99%
“…Moving-Target Defense (MTD) is a popular example of proactive defense. Many MTD techniques have been proposed (see, e.g., [90] and the numerous references therein) and many aspects of MTD have been investigated (see, e.g., [52,103,77,25,84]). However, very few studies have aimed at systematically quantifying the effectiveness of MTD.…”
Section: Proactive Cyber Defense Dynamicsmentioning
confidence: 99%