FIELD: information technology.
SUBSTANCE: method and system are provided for embodying a security policy encoded in a set of instructions of a virtual security machine. The security system provides a virtual security machine which executes security programs expressed in the set of instructions of the virtual security machine. The security system stores the security program in the virtual security machine instruction storage. When a security embodiment event occurs, the virtual security machine executes instructions from its instruction storage using data of the security embodiment event to embody the security policy.
EFFECT: improved method of embodying security policies which give conditions for accuracy of parametres of application program interfaces.
25 cl, 11 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
SECURITY-RELATED PROGRAM INTERFACE | 2004 |
|
RU2377639C2 |
VIRTUALISATION FOR DIVERSIFIED PROTECTION FROM UNAUTHORISED INTERFERENCE | 2007 |
|
RU2458394C2 |
SYSTEM AND METHOD OF IMPROVING ORGANISATION DATA SECURITY BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2541895C2 |
METHOD OF FUNCTIONING COMPUTER DEVICE OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX | 2016 |
|
RU2626350C1 |
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE | 2014 |
|
RU2584507C1 |
ABSTRACTION OF SECURITY POLICY FROM ACCESS CONTROL PROCEDURES AND TRANSFORMING SUCH PROCEDURES INTO OWN REPRESENTATIONS | 2007 |
|
RU2447497C2 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
SYSTEMS AND METHODS FOR CONTROLLING DRIVERS IN A COMPUTER SYSTEM | 2002 |
|
RU2304305C2 |
METHODS AND SYSTEMS FOR SEARCHING FOR APPLICATION SOFTWARE | 2014 |
|
RU2598988C2 |
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
Authors
Dates
2010-05-27—Published
2005-03-16—Filed