A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems.
Robert A. McKoskySajjan G. ShivaPublished in: Comput. Secur. (1990)
Keyphrases
- computer systems
- multi user
- integrity checking
- integrity constraints
- computer security
- computer hardware
- virtual environment
- deductive databases
- virtual world
- data processing
- multi granularity
- operating system
- communication systems
- computing systems
- hard and soft constraints
- multiple users
- computer technology
- cyber attacks
- single user
- constraint logic programming
- user interface
- countermeasures
- information processing systems
- augmented reality
- information systems
- computer networks
- computer programs
- file system
- database
- malware detection
- intrusion detection system
- human beings
- high end
- expert systems
- static analysis