Prevention of Unauthorized Software Execution: Identification of Applications
In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2010-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/786 |
_version_ | 1797763539732004864 |
---|---|
author | E. Y. Rodionov M. V. Senik |
author_facet | E. Y. Rodionov M. V. Senik |
author_sort | E. Y. Rodionov |
collection | DOAJ |
description | In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer. |
first_indexed | 2024-03-12T19:43:55Z |
format | Article |
id | doaj.art-0cdc2e81dbc049c1a23eb04862cab2d7 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T19:43:55Z |
publishDate | 2010-03-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-0cdc2e81dbc049c1a23eb04862cab2d72023-08-02T03:40:05ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362010-03-01171105107776Prevention of Unauthorized Software Execution: Identification of ApplicationsE. Y. RodionovM. V. SenikIn this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.https://bit.mephi.ru/index.php/bit/article/view/786processidentification of applicationhashdigital signature |
spellingShingle | E. Y. Rodionov M. V. Senik Prevention of Unauthorized Software Execution: Identification of Applications Безопасность информационных технологий process identification of application hash digital signature |
title | Prevention of Unauthorized Software Execution: Identification of Applications |
title_full | Prevention of Unauthorized Software Execution: Identification of Applications |
title_fullStr | Prevention of Unauthorized Software Execution: Identification of Applications |
title_full_unstemmed | Prevention of Unauthorized Software Execution: Identification of Applications |
title_short | Prevention of Unauthorized Software Execution: Identification of Applications |
title_sort | prevention of unauthorized software execution identification of applications |
topic | process identification of application hash digital signature |
url | https://bit.mephi.ru/index.php/bit/article/view/786 |
work_keys_str_mv | AT eyrodionov preventionofunauthorizedsoftwareexecutionidentificationofapplications AT mvsenik preventionofunauthorizedsoftwareexecutionidentificationofapplications |