Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen Johnson is active.

Publication


Featured researches published by Stephen Johnson.


consumer communications and networking conference | 2004

Applicability of low water-mark mandatory access control security in Linux-based advanced networked consumer electronics

Jinhong K. Guo; Stephen Johnson; David Alan Braun; Il-Pyung Park

Linux is an open source operating system that is rapidly gaining popularity in consumer electronic devices, especially in digital audio and video devices. However, with its success in the market, there is a greater need for security. We present a Trojan attack scenario that compromises the security of a Linux-based networked appliance. Then, we demonstrate how a simple low water-mark mandatory access control (LOMAC) module can protect the system against such attacks. However, LOMAC implements this access control by interposition at the kernels system call interface and uses implicit attribute mapping to map security attributes to files, which is invasive. We present a LOMAC implementation as a Linux security module (LSM), a new framework for providing standard interfaces to loadable security modules for the Linux kernel.


consumer communications and networking conference | 2006

An operating system security method for integrity and privacy protection in consumer electronics

Jinhong K. Guo; Stephen Johnson; Il-Pyung Park

Linux is an open source operating system that is rapidly gaining popularity in consumer electronic devices. It has started being deployed in mobile phones and digital audio and video devices. However, with its success in the market, there is a greater need for security. The traditional Discretionary Access Control (DAC) model does not provide adequate security support. Mandatory Access Control (MAC) models can provide additional security in addition to the DAC scheme. However, some of the existing MAC schemes are too complex to be used in embedded devices, while others are simple yet do not provide fine-grained access control. In this paper, we present a MAC model that grants subjects permissions based on their past behavior. It is simple but it also provides a fine-grained access control to the operating system. With its small footprint, it can be applied to various systems, including embedded devices.


Archive | 1997

Electronic news reception apparatus that selectively retains sections and searches by keyword or index for text to speech conversion

Ronald B. Richard; Kazue Hata; Stephen Johnson; Steve Pearson; Judson A. Hofmann; Brian A. Hanson


Archive | 2001

Automobile data archive system having securely authenticated instrumentation data storage

Robert Fish; Dennis Bushmitch; David Braun; Chieh-Chung Chang; Stephen Johnson; Mahfuz Rahman; Luyang Li


Archive | 2007

INTRUSION DETECTION USING SYSTEM CALL MONITORS ON A BAYESIAN NETWORK

Jinhong Guo; Stephen Johnson


Archive | 2001

Removable front panel for an entertainment device

Robert Fish; Dennis Bushmitch; David Alan Braun; Chieh-Chung Chang; Stephen Johnson; Mahfuz Rahman; Luyang Li


Archive | 1994

Method for proximity searching with range testing and range adjustment

Daniel Barbara; Stephen Johnson; Sharad Mehrotra; Walid G. Aref


Archive | 2005

Automatic recording based on preferences

Stephen Johnson; Rajesh B. Khandelwal; Yue Ma; Il-Pyung Park; Luyang Li


Archive | 2001

Entertainment device having a content library and adaptive content selection

Robert Fish; Mahfuzur Rahman; Chieh-Chung Chang; Dennis Bushmitch; Stephen Johnson; David Braun; Luyang Li


Archive | 2002

METHOD OF INTEGRATING SUBSCRIBER BASED TRAFFIC NAVIGATION AND HOSPITALITY DATA WITH A GLOBAL POSITIONING SYSTEM

Robert Fish; Stephen Johnson; Chieh-Chung Chang; Dennis Bushmitch; David Braun; Mahfuz Rahman; Luyang Li

Collaboration


Dive into the Stephen Johnson's collaboration.

Researchain Logo
Decentralizing Knowledge