Capability-based security

Results: 256



#Item
21View access control as a matrix  Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
22CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-09 14:29:53
23Requirements and Recommendations for CWE Compatibility and CWE Effectiveness Document version: 1.0 Date: July 28, 2011 This is a draft report and does not represent an official position of The MITRE Corporation. Copyrigh

Requirements and Recommendations for CWE Compatibility and CWE Effectiveness Document version: 1.0 Date: July 28, 2011 This is a draft report and does not represent an official position of The MITRE Corporation. Copyrigh

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2013-04-02 14:04:54
24Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA,  Stephen Smalley, NAI Labs,  Abstract The protection mechanisms of current mai

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
25The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

Add to Reading List

Source URL: www.cap-lore.com

Language: English - Date: 2009-05-04 18:57:36
26Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: combex.com

Language: English - Date: 2005-08-18 16:59:47
27TACTICS PROJECT DELIVERABLE  SEVENTH FRAMEWORK PROGRAMME Collaborative project Small or medium-scale focused research project FP7-SEC

TACTICS PROJECT DELIVERABLE SEVENTH FRAMEWORK PROGRAMME Collaborative project Small or medium-scale focused research project FP7-SEC

Add to Reading List

Source URL: www.fp7-tactics.eu

Language: English - Date: 2014-10-14 05:31:18
282013 IEEE Symposium on Security and Privacy  Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡

2013 IEEE Symposium on Security and Privacy Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:52:14
29Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-12-23 01:59:20
30CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42