Capability-based security

Results: 256



#Item
51Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
52Disaster preparedness / Emergency management / Humanitarian aid / Occupational safety and health / Capability-based security / Civil defense / Public safety / Management / Security

    Summary of the capability assessment For the capability assessment the SZREDA team and the local working group use the methods described in the chapter for the capability assessment from the

Add to Reading List

Source URL: www.prismaproject.eu

Language: English - Date: 2014-10-20 12:17:31
53Evaluation methods / Democracy / Qualitative research / Capability approach / Deliberative democracy / E-democracy / Participant observation / Ethnography / Capability-based security / Science / Sociology / Direct democracy

Microsoft Word - JEssen-democratic selection

Add to Reading List

Source URL: www.happysociety.org

Language: English - Date: 2015-04-07 18:52:17
54Access control / Data types / Primitive types / Capability-based security / Object-capability model / EROS / Capability-based addressing / Pointer / Principle of least privilege / Computer security / Security / Computing

unknown2004-10-23T01:01:00 unknown2004-10-23T01:01:00 unknown2004-10-23T00:34:00^ unknown2004-10-23T00:35:00^

Add to Reading List

Source URL: erights.org

Language: English - Date: 2005-10-31 19:06:12
55Computer programming / Pointer / Capability-based security / C / Memory protection / Computing / Software engineering / Procedural programming languages

PDF Document

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 09:34:28
56Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-01 06:45:15
57Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

Capability Myths Demolished Mark S. Miller Combex, Inc.

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2005-10-31 18:00:51
58Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
59Computer architecture / Distributed file system / Capability-based security / File system / Ceph / Object storage device / Unix / File descriptor / Lustre / Network file systems / Computing / System software

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
60Identity management / Security Assertion Markup Language / Voms / PERMIS / Grid computing / Capability-based security / Authorization / Privilege Management Infrastructure / Authentication / Security / Computer security / Access control

XPOLA – An Extensible Capability-based Authorization Infrastructure for Grids Liang Fang and Dennis Gannon Computer Science Department, Indiana University, Bloomington, INFrank Siebenlist

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2005-06-09 17:29:36
UPDATE