First Page | Document Content | |
---|---|---|
![]() Date: 2010-10-08 02:30:09Crime prevention Cryptography Information governance National security Computer security Information security Memory protection Capability-based security Protection ring Operating system Principle of least privilege Process management | Add to Reading List |
![]() | Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson Jonathan AndersonDocID: 1qB6h - View Document |
![]() | Opinion: Least Privilege for Solaris Subject Submitted by File DateDocID: 1pxdc - View Document |
![]() | Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, BerkeleyDocID: 1pnkN - View Document |
![]() | PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]DocID: 1p8Cz - View Document |
![]() | Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.eduDocID: 1p1uA - View Document |