Permission Re-Delegation: Attacks and Defenses.
Adrienne Porter FeltHelen J. WangAlexander MoshchukSteve HannaErika ChinPublished in: USENIX Security Symposium (2011)
Keyphrases
- access control
- security policies
- network security
- role based access control
- denial of service attacks
- dos attacks
- denial of service
- security mechanisms
- traffic analysis
- access control systems
- access control policies
- countermeasures
- security risks
- security threats
- information security
- security requirements
- computer security
- malicious users
- ddos attacks
- chosen plaintext
- multi domain
- watermarking scheme
- third party
- data security
- watermarking algorithm
- conflict resolution
- spam filters
- intrusion detection system
- intrusion detection
- terrorist attacks
- neural network
- java card
- network traffic
- malicious attacks
- lightweight
- anomaly detection
- cooperative