<--- Back to Details
First PageDocument Content
Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Thread / Trusted computing base / Privilege separation / Privilege / Computer architecture / Computer security / Computing
Date: 2009-03-04 17:16:50
Separation kernel
Principle of least privilege
Kernel
Ring
Linux kernel
Thread
Trusted computing base
Privilege separation
Privilege
Computer architecture
Computer security
Computing

Microsoft Word - C5_077_LEVIN.doc

Add to Reading List

Source URL: www.cisr.us

Download Document from Source Website

File Size: 293,02 KB

Share Document on Facebook

Similar Documents

Software / Computing / Computer security / Software testing / Data security / Sandbox / Compartmentalization / Cellular compartment / Seccomp / Compartment / Vulnerability / Principle of least privilege

Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson Jonathan Anderson

DocID: 1qB6h - View Document

System calls / Computer security / Information theory / Principle of least privilege / Privilege / Solaris / Linux kernel / Protection ring / File system / Device driver / Sun Microsystems / Procfs

Opinion: Least Privilege for Solaris Subject Submitted by File Date

DocID: 1pxdc - View Document

Humancomputer interaction / Usability / Human communication / Computer security / Ergonomics / User interface / Principle of least privilege / User / Error message / User interface design / Secure by default

Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

DocID: 1pnkN - View Document

Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

DocID: 1p8Cz - View Document

Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

DocID: 1p1uA - View Document