Prevention of Unauthorized Software Execution: Identification of Applications

In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.

Bibliographic Details
Main Authors: E. Y. Rodionov, M. V. Senik
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2010-03-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/786
_version_ 1797763539732004864
author E. Y. Rodionov
M. V. Senik
author_facet E. Y. Rodionov
M. V. Senik
author_sort E. Y. Rodionov
collection DOAJ
description In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.
first_indexed 2024-03-12T19:43:55Z
format Article
id doaj.art-0cdc2e81dbc049c1a23eb04862cab2d7
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T19:43:55Z
publishDate 2010-03-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-0cdc2e81dbc049c1a23eb04862cab2d72023-08-02T03:40:05ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362010-03-01171105107776Prevention of Unauthorized Software Execution: Identification of ApplicationsE. Y. RodionovM. V. SenikIn this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.https://bit.mephi.ru/index.php/bit/article/view/786processidentification of applicationhashdigital signature
spellingShingle E. Y. Rodionov
M. V. Senik
Prevention of Unauthorized Software Execution: Identification of Applications
Безопасность информационных технологий
process
identification of application
hash
digital signature
title Prevention of Unauthorized Software Execution: Identification of Applications
title_full Prevention of Unauthorized Software Execution: Identification of Applications
title_fullStr Prevention of Unauthorized Software Execution: Identification of Applications
title_full_unstemmed Prevention of Unauthorized Software Execution: Identification of Applications
title_short Prevention of Unauthorized Software Execution: Identification of Applications
title_sort prevention of unauthorized software execution identification of applications
topic process
identification of application
hash
digital signature
url https://bit.mephi.ru/index.php/bit/article/view/786
work_keys_str_mv AT eyrodionov preventionofunauthorizedsoftwareexecutionidentificationofapplications
AT mvsenik preventionofunauthorizedsoftwareexecutionidentificationofapplications