Latest Fundamental Syntax for Detecting Virus Signature

Authors

  • Soumen Chakraborty  Department of Information Technology, MCKV Institute of Engineering, Maulana Abul Kalam Azad University of Technology, West Bengal, India

Keywords:

Computer Ready Sets, Syntax, Antivirus, scanning, protection coverage

Abstract

This paper provides centralized information containing reference records and estimating strategies for some of the key variables for figuring out risks and losses will help to offer a stronger case for safety improvement to control. A discussion of strategies for the valuation of actual and intangible assets will assist to quantify the largest records safety risk in ., that is theft of proprietary. Additional recognition is positioned on crucial risk regions, the usage of a centralized facts desk containing reference facts and estimating techniques for a number of the key variables for determining dangers and losses will help to offer a more potent case for security improvement to control. A dialogue of strategies for the valuation of exact and intangible property will assist to quantify the biggest statistics protection danger , which is theft of proprietary statistics Additional recognition is placed on vital hazard areas such as net security, foreign places safety worries, and pc safety. This paper should additionally help an IT safety representative to achieve new business through the advent of a nicely written quantitative danger analysis.

References

  1. Abadi, M. and Gordon, A.: A calculus for Cryptographic Protocols: the Spi Calculus, Information and Computation (1999)
  2. Bell, D. E. and LaPadula, L. J.: Secure Computer System: Unified Exposition and Multics Interpretation, Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma.(1976)
  3. Bellare, M. and Rogaway, P.: Entity Authentication and key Distribution, Advances in Cryptography- Proceedings of Crypto (1993) 55
  4. Biba, K. J.: Integrity Considerations for Secure Computer Systems, US Airforce Electronic Systems Division (1977) 10
  5. Brewer, D. F. C., Nash, M. J.: The Chinese Wall security policy, in Proceedings of the IEEE Symposium on Security and Privacy, (1989) 206-214 9
  6. Broadfoot, P. et al: Automating Data Independence, European Symposium on Research in Computer Security, LNCS vol 1895, Springer (2000) 55
  7. Brookes, S. D. and Roscoe, A. W.: An Improved Failures Model for Communicating Sequential Processes Springer Verlag, Proceedings NSF-SERC Seminar on Concurrency (1985) 17
  8. Cardelli, L.: Mobility and Security, Lecture Notes for the Marktoberdorf Summer School (1999)
  9. Clark, D. R. and Wilson, D. R.: A Comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy, (1987) 184-194 9
  10. Cleaveland, R. and Hennessy, M.: Testing equivalence as a bisimulation equivalence. Formal Aspects of Computing, Volume 5, (1993) 1-20 44
  11. Cohen, E.: Information Transmission in computational Systems. Sixth ACM Symp. on Operating Systems Principles, November (1977) 133-139
  12. Coppersmith, D. et al.: Low-exponent RSA with related messages. In Advances in Cryptology - EUROCRYPT ’96 (Lecture Notes in Computer Science 1070), Springer-Verlag, (1996) 1-9 54
  13. Davies, J., Schneider S. A.: A Brief History of Timed CSP, Theoretical Computer Science, 138, (1995) 17
  14. Desmedt, Y. and Yung, M.: Minimal cryptosystems and defining subliminalfreeness. In Proceedings 1994 IEEE International Symposium on Information Theory, p. 347, Trondheim, Norway, June 27-July 1, (1994) 55
  15. US Department of Defense: DOD Trusted Computer Security System Evaluation Criteria (The Orange Book), DOD 5200.28-STD, (1985) 7
  16. Durante, A. et al: A Compiler for Analysing Cryptographic Protocols using NonInterference, ACM Trans. on Soft.Eng. and Method, 9(4) (2000) 1-9 54
  17. http://www.formal.demon.co.uk

Downloads

Published

2017-02-28

Issue

Section

Research Articles

How to Cite

[1]
Soumen Chakraborty, " Latest Fundamental Syntax for Detecting Virus Signature, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 1, pp.202-208, January-February-2017.