By Topic

Safe email, safe office, and safe web browser demo description

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Balzer, R. ; Teknowledge Corp., Marina del Rey, CA, USA

Security wrappers for Windows NT/2000 encapsulate program execution to monitor their run-time behavior and ensure that they don't do anything harmful. Wrappers have be developed to ensure that email attachments can be safely opened that web content can be safely viewed, downloaded, and executed and that active content in office documents can be safely executed. The wrappers can be directed to allow the execution of operations that violate security rules to safely continue by virtualizing their operation so that the effects are contained within the executing process and are not visible to any other process. This ensures that processes run within their prescribed security policy (relative to the real resources protected by that security policy) without user intervention or control. Violations of that security policy are automatically and transparently contained without user involvement or knowledge. This fully autonomic safety policy eliminates the configuration problem that has plagued existing behavior monitoring systems.

Published in:

DARPA Information Survivability Conference and Exposition, 2003. Proceedings  (Volume:2 )

Date of Conference:

22-24 April 2003