Confused deputy problem

Results: 12



#Item
1Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
2CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
3Preparing for the Cross Site Request Forgery Defense Chuck Willis  Black Hat DC 2008 February 20, 2008

Preparing for the Cross Site Request Forgery Defense Chuck Willis Black Hat DC 2008 February 20, 2008

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
4Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

Capability Myths Demolished Mark S. Miller Combex, Inc.

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2005-10-31 18:00:51
5ADAPTIVE USER INTERFACE RANDOMIZATION AS AN ANTI-CLICKJACKING STRATEGY Brad Hill <bhill at paypal-inc.com> Version 1.0, 18 MayAbstract

ADAPTIVE USER INTERFACE RANDOMIZATION AS AN ANTI-CLICKJACKING STRATEGY Brad Hill Version 1.0, 18 MayAbstract

Add to Reading List

Source URL: www.thesecuritypractice.com

Language: English - Date: 2012-05-19 00:32:46
6Access control / Cross-platform software / CapDesk / Capability-based security / EROS / E / Confused deputy problem / Vulnerability / Java / Computing / Security / Computer security

Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:56:47
7A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:23
8The Effectiveness of Application Permissions Adrienne Porter Felt∗, Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [removed] Abstract

The Effectiveness of Application Permissions Adrienne Porter Felt∗, Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [removed] Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
9ACLs don’t  Abstract The ACL model is unable to make correct access decisions for interactions involving more than two principals, since required information is not retained

ACLs don’t Abstract The ACL model is unable to make correct access decisions for interactions involving more than two principals, since required information is not retained

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38
10ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract

ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38