AU2686699A - Stack-based security requirements - Google Patents
Stack-based security requirementsInfo
- Publication number
- AU2686699A AU2686699A AU26866/99A AU2686699A AU2686699A AU 2686699 A AU2686699 A AU 2686699A AU 26866/99 A AU26866/99 A AU 26866/99A AU 2686699 A AU2686699 A AU 2686699A AU 2686699 A AU2686699 A AU 2686699A
- Authority
- AU
- Australia
- Prior art keywords
- stack
- security requirements
- based security
- requirements
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/427—Loop networks with decentralised control
- H04L12/433—Loop networks with decentralised control with asynchronous transmission, e.g. token ring, register insertion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/547—Remote procedure calls [RPC]; Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Multi Processors (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US7604898P | 1998-02-26 | 1998-02-26 | |
US60076048 | 1998-02-26 | ||
US09044944 | 1998-03-20 | ||
US09/044,944 US6226746B1 (en) | 1998-03-20 | 1998-03-20 | Stack-based system and method to combine security requirements of methods |
PCT/US1999/003519 WO1999044138A2 (en) | 1998-02-26 | 1999-02-18 | Stack-based security requirements |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2686699A true AU2686699A (en) | 1999-09-15 |
Family
ID=26722193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU26866/99A Abandoned AU2686699A (en) | 1998-02-26 | 1999-02-18 | Stack-based security requirements |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1057110A2 (zh) |
JP (1) | JP2002505477A (zh) |
KR (1) | KR20010040981A (zh) |
CN (1) | CN1298511A (zh) |
AU (1) | AU2686699A (zh) |
WO (1) | WO1999044138A2 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100560166B1 (ko) * | 2001-12-05 | 2006-03-13 | 한국전자통신연구원 | 실시간 버퍼 오버플로우 해킹 탐지 방법 |
JP4062441B2 (ja) | 2003-07-18 | 2008-03-19 | 日本電気株式会社 | 並列処理システム及び並列処理プログラム |
US7284107B2 (en) * | 2004-04-30 | 2007-10-16 | Microsoft Corporation | Special-use heaps |
JP4844102B2 (ja) * | 2005-11-30 | 2011-12-28 | 富士ゼロックス株式会社 | サブプログラム及びそのサブプログラムを実行する情報処理装置 |
KR100949949B1 (ko) * | 2008-02-28 | 2010-03-30 | 주식회사 안철수연구소 | 콜 스택을 이용한 디버깅 방지 방법 및 장치 |
US10229280B2 (en) * | 2011-06-14 | 2019-03-12 | International Business Machines Corporation | System and method to protect a resource using an active avatar |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0635792B1 (de) * | 1993-07-16 | 2003-08-27 | Siemens Aktiengesellschaft | Verfahren zur Koordination von parallelen Zugriffen mehrerer Prozessoren auf Resourcenkonfigurationen |
AU3727097A (en) * | 1996-07-25 | 1998-02-20 | Tradewave Corporation | Method and system for generalized protocol implementation on client/server communications connections |
-
1999
- 1999-02-18 JP JP2000533821A patent/JP2002505477A/ja active Pending
- 1999-02-18 EP EP99907134A patent/EP1057110A2/en not_active Withdrawn
- 1999-02-18 AU AU26866/99A patent/AU2686699A/en not_active Abandoned
- 1999-02-18 CN CN99805488A patent/CN1298511A/zh active Pending
- 1999-02-18 WO PCT/US1999/003519 patent/WO1999044138A2/en not_active Application Discontinuation
- 1999-02-18 KR KR1020007008972A patent/KR20010040981A/ko not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
EP1057110A2 (en) | 2000-12-06 |
WO1999044138A3 (en) | 1999-11-04 |
JP2002505477A (ja) | 2002-02-19 |
CN1298511A (zh) | 2001-06-06 |
KR20010040981A (ko) | 2001-05-15 |
WO1999044138A2 (en) | 1999-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU3775999A (en) | Computer security | |
AU2769899A (en) | Stack-based access control | |
AU6161699A (en) | Telephony security system | |
AUPO617097A0 (en) | Security seal | |
AU7695400A (en) | Security arrangement | |
AU5476200A (en) | Security case | |
AUPQ112999A0 (en) | Security closure | |
AU8103698A (en) | Security box | |
AU3781399A (en) | Computer security | |
AUPP506898A0 (en) | Security door | |
AU2066399A (en) | Security device manufacture | |
AU3178600A (en) | Security systems | |
AU3804299A (en) | Closure system | |
AU4941300A (en) | Security system | |
AU2686699A (en) | Stack-based security requirements | |
AU697162B3 (en) | Security screen | |
AU9179098A (en) | Security devices | |
AU3179200A (en) | Security systems | |
AU7675800A (en) | Security systems | |
AU742820C (en) | Security closure | |
AU4809399A (en) | Security paper | |
AU3442100A (en) | Security devices | |
AU2556800A (en) | Security unit | |
AU4871799A (en) | Security devices | |
AU5778598A (en) | Security door |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |