Detecting illicit leakage of information in operating systems

Shiuhpyng Shieh*, Virgil D. Gligor

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

In this paper we investigate the illicit means of leaking sensitive or private information in operating systems. The leakage cannot be eliminated either by the use of access control and authentication mechanisms or by administrative measures since unauthorized access need not be attempted. In order to resolve the problem, we designed an audit system which is able to detect the illicit leakage of information. This audit system consists of two major components: an enhanced audit-collection mechanism and an audit-analysis tool.

Original languageEnglish
Pages (from-to)123-148
Number of pages26
JournalJournal of Computer Security
Volume4
Issue number2-3
DOIs
StatePublished - 1 Jan 1996

Fingerprint Dive into the research topics of 'Detecting illicit leakage of information in operating systems'. Together they form a unique fingerprint.

Cite this