Right Management

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 159573 Experts worldwide ranked by ideXlab platform

Jeanlouis Mandel - One of the best experts on this subject based on the ideXlab platform.

  • cerberus an access control scheme for enforcing least privilege in patient cohort study platforms a comprehensive access control scheme applied to the genida project study of genetic forms of intellectual disabilities and autism spectrum disorders
    Journal of Medical Systems, 2018
    Co-Authors: Pierre Parrend, Timothee Mazzucotelli, Florent Colin, Pierre Collet, Jeanlouis Mandel
    Abstract:

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access Right Management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access Rights, as well as the ability to restrict these Rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

Woeijiunn Tsaur - One of the best experts on this subject based on the ideXlab platform.

  • strengthening digital Rights Management using a new driver hidden rootkit
    IEEE Transactions on Consumer Electronics, 2012
    Co-Authors: Woeijiunn Tsaur
    Abstract:

    It can be observed that a rootkit may be used to conceal the digital Rights Management (DRM) software, which is aptly installed in consumers' computers to prevent unauthorized copying. In order to prevent unauthorized users from deleting the digital Right Management software by employing anti-rootkit tools to remove the rootkit, we develop a new driver-hidden rootkit to strengthen digital Right Management in this paper. The proposed driver-hidden rootkit is constructed using the technique of DKOM (Direct Kernel Object Manipulation), and have verified that it can successfully avoid a variety of well-known rootkit detectors. Our contributions are twofold. First, we can use the proposed new rootkit technology to extend the protection of the DRM software. Second, the stealth tricks of the proposed sophisticated driver-hidden rootkit can be a great inspiration to defenders who need to effectively strengthen the legitimate uses.

  • a new windows driver hidden rootkit based on direct kernel object manipulation
    International Conference on Algorithms and Architectures for Parallel Processing, 2009
    Co-Authors: Woeijiunn Tsaur, Yuhchen Chen, Beingyu Tsai
    Abstract:

    In 2005, Sony-BMG used a rootkit to conceal the digital Right Management software, which is aptly installed in consumers' computers to prevent unauthorized copying. As a result, it lets the installed rootkit computers provide malware with excellent shelters to be capable of escaping anti-virus detection easily. We can observe that more and more malware writers are taking advantage of rootkits to shield their illegal activities. In this paper, we develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation (DKOM), and have verified that it can successfully avoid well-known rootkit detectors. Our research goal is to find out the weaknesses of current detectors, and expect detector developers pay much attention to them and upgrade their products in order to identify the proposed new rookit. We affirm our efforts will be useful for stimulating detector developers to improve the current techniques of detecting Windows Driver-Hidden Rootkits.

Beingyu Tsai - One of the best experts on this subject based on the ideXlab platform.

  • a new windows driver hidden rootkit based on direct kernel object manipulation
    International Conference on Algorithms and Architectures for Parallel Processing, 2009
    Co-Authors: Woeijiunn Tsaur, Yuhchen Chen, Beingyu Tsai
    Abstract:

    In 2005, Sony-BMG used a rootkit to conceal the digital Right Management software, which is aptly installed in consumers' computers to prevent unauthorized copying. As a result, it lets the installed rootkit computers provide malware with excellent shelters to be capable of escaping anti-virus detection easily. We can observe that more and more malware writers are taking advantage of rootkits to shield their illegal activities. In this paper, we develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation (DKOM), and have verified that it can successfully avoid well-known rootkit detectors. Our research goal is to find out the weaknesses of current detectors, and expect detector developers pay much attention to them and upgrade their products in order to identify the proposed new rookit. We affirm our efforts will be useful for stimulating detector developers to improve the current techniques of detecting Windows Driver-Hidden Rootkits.

Pierre Parrend - One of the best experts on this subject based on the ideXlab platform.

  • cerberus an access control scheme for enforcing least privilege in patient cohort study platforms a comprehensive access control scheme applied to the genida project study of genetic forms of intellectual disabilities and autism spectrum disorders
    Journal of Medical Systems, 2018
    Co-Authors: Pierre Parrend, Timothee Mazzucotelli, Florent Colin, Pierre Collet, Jeanlouis Mandel
    Abstract:

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access Right Management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access Rights, as well as the ability to restrict these Rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

Yuhchen Chen - One of the best experts on this subject based on the ideXlab platform.

  • a new windows driver hidden rootkit based on direct kernel object manipulation
    International Conference on Algorithms and Architectures for Parallel Processing, 2009
    Co-Authors: Woeijiunn Tsaur, Yuhchen Chen, Beingyu Tsai
    Abstract:

    In 2005, Sony-BMG used a rootkit to conceal the digital Right Management software, which is aptly installed in consumers' computers to prevent unauthorized copying. As a result, it lets the installed rootkit computers provide malware with excellent shelters to be capable of escaping anti-virus detection easily. We can observe that more and more malware writers are taking advantage of rootkits to shield their illegal activities. In this paper, we develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation (DKOM), and have verified that it can successfully avoid well-known rootkit detectors. Our research goal is to find out the weaknesses of current detectors, and expect detector developers pay much attention to them and upgrade their products in order to identify the proposed new rookit. We affirm our efforts will be useful for stimulating detector developers to improve the current techniques of detecting Windows Driver-Hidden Rootkits.