Capability-based security

Results: 256



#Item
11Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
12Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
13Computer access control / Access control / Access control list / Mandatory access control / Role-based access control / Privilege / WebDAV / User / PERMIS / Capability-based security / Superuser / NTFS

Intentional Access Management: Making Access Control Usable for End-Users

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-13 14:38:51
14Memory management / Instruction set architectures / Memory protection / Capability-based security / Kernel / Memory management unit / MIPS instruction set / Protection ring / Microkernel / EROS / Virtual memory / 64-bit computing

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:58
15Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
16Metrology / Measurement / EURAMET / Academia / Capability-based security

Microsoft Word - RPT 2016 Scope.docx

Add to Reading List

Source URL: msu.euramet.org

Language: English - Date: 2015-12-14 10:16:26
17Education / Science and technology / Technology / Academia / Engineering education / Experiential learning / Mathematics education / Science education / Science /  technology /  engineering /  and mathematics / Capability-based security

Section 7 PEO LS PROGRAMS Advanced Technology Investment Plan

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2016-03-29 12:49:39
18United States Department of Justice / ISO/IEC 11179 / Metadata registry / National Information Exchange Model / United States Department of Homeland Security / Capability-based security / Computer security / Password / Internet privacy / Federated search

Abstract blue technology blurred lines background

Add to Reading List

Source URL: www.ojbc.org

Language: English - Date: 2015-04-15 14:21:08
19

A National Early Warning Capability Based on a Network of Distributed Honeypots Cristine Hoepers, Klaus Steding-Jessen, Luiz E. R. Cordeiro, Marcelo H. P. C. Chaves NIC BR Security Office – NBSO Brazilian Computer Emer

Add to Reading List

Source URL: www.cert.br

Language: English - Date: 2010-08-13 12:19:32
    20Public policy / Carnegie Mellon University / Capability-based security / Kathleen Carley / Military capability / Military / Engineering and Public Policy / Network science / ESCM-SP / Capability Maturity Model

    Structural Measurement Of Military Organization Capability

    Add to Reading List

    Source URL: www.casos.cs.cmu.edu

    Language: English
    UPDATE