Capability-based security

Results: 256



#Item
21Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
22Hacking / Capsicum / Capability-based security / Thread / Mandatory access control / Exception handling / Operating system / Vulnerability / C / Computing / Computer security / Software engineering

CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-09 14:29:53
23CWE / Capability-based security / Requirement / Computing / Anticipatory thinking / Software quality / Source code

Requirements and Recommendations for CWE Compatibility and CWE Effectiveness Document version: 1.0 Date: July 28, 2011 This is a draft report and does not represent an official position of The MITRE Corporation. Copyrigh

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2013-04-02 14:04:54
24National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
25Microkernel / Capability-based security / Domain / Key / Windows key / Kernel / Function key / EROS / Memory protection / Computer architecture / Security / KeyKOS

The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

Add to Reading List

Source URL: www.cap-lore.com

Language: English - Date: 2009-05-04 18:57:36
26Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: combex.com

Language: English - Date: 2005-08-18 16:59:47
27Crime prevention / Law enforcement / Computer network security / Vulnerability / Counter-terrorism / Computer security / Threat / Privacy / Capability-based security / Security / National security / Public safety

TACTICS PROJECT DELIVERABLE SEVENTH FRAMEWORK PROGRAMME Collaborative project Small or medium-scale focused research project FP7-SEC

Add to Reading List

Source URL: www.fp7-tactics.eu

Language: English - Date: 2014-10-14 05:31:18
28Text mode / Wget / Capability-based security / Capsicum / Process / Programming language / Computer program / Computer security / Algorithm / Software / Computing / Portable software

2013 IEEE Symposium on Security and Privacy Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:52:14
29Access control / Capability-based security / Kernel / Operating system / X Window System / Server / Unix / Software / System software / Computing

Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-12-23 01:59:20
30Capability-based security / Confused deputy problem / Principle of least privilege / Object-capability model / Ambient authority / File descriptor / Privilege / Filename / Computer security / Security / Access control

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
UPDATE