Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen D. Wolthusen is active.

Publication


Featured researches published by Stephen D. Wolthusen.


annual computer security applications conference | 2001

Security policy enforcement at the file system level in the Windows NT operating system family

Stephen D. Wolthusen

This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a centrally administered security policy under the Windows NT operating system platform. The mechanism provides mandatory access control, encryption, and auditing on an individual file basis across distributed systems while being fully transparent to both users and application programs and functioning regardless of the type of file system or its attachment mechanism.


annual computer security applications conference | 2003

Goalkeeper: close-in interface protection

Stephen D. Wolthusen

This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of countermeasures for the identified threats is described along with the integration of countermeasures into a policy-based security infrastructure; finally, an implementation of the countermeasure in the form of a policy enforcement module integrated into the kernel of the Microsoft Windows 2000/XP family of operating systems is described.


Archive | 2003

Techniques and Applications of Digital Watermarking and Content Protection

Michael Arnold; Martin Schmucker; Stephen D. Wolthusen


IAS | 2001

Layered multipoint network defense and security policy enforcement

Stephen D. Wolthusen


Archive | 2004

Tempering Network Stacks

Stephen D. Wolthusen


Archive | 2000

Concepts for an Watermarking Technique for Music Scores

Christoph Busch; Ero Rademer; Martin Schmucker; Stephen D. Wolthusen


Archive | 2001

Method for integrating hidden information in a set of notes

Stephen D. Wolthusen; Christoph Busch; Ero Rademer


Archive | 2003

Asymmetric Information Warfare: Cyberterrorism Critical Infrastructures

Stephen D. Wolthusen


Archive | 2002

IT-Sicherheit - wie geht das?

Christoph Busch; Stephen D. Wolthusen


Archive | 2001

Verfahren zum einbringen verborgener information in einen notensatz

Ero Rademer; Stephen D. Wolthusen; Christoph Busch

Collaboration


Dive into the Stephen D. Wolthusen's collaboration.

Top Co-Authors

Avatar

Christoph Busch

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge