File system permissions

Results: 81



#Item
11System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control

Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-25 14:11:54
12Software / Computing / System software / Social networking services / File system permissions / Computer file / Facebook / Ls / Mobile security / Umask

Cognitive Disconnect: Understanding Facebook Connect Login Permissions Nicky Robinson Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-09-28 21:08:31
13Software / Time of check to time of use / Setuid / Symbolic link / Ln / File system / Procfs / Inode / Filesystem permissions / Computing / System software / Unix

Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:51
14Magento / Computing / Filesystem permissions / File system / Install

INSTALLATION GUIDE Attachments and file upload for products WWW.STORE.BELVG.COM Description:

Add to Reading List

Source URL: www.we-heat.com

Language: English - Date: 2012-11-19 18:06:12
15Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
16Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
17Crime prevention / Data security / Information security / National security / Computer file / Portable Document Format / Filesystem permissions / File system / Email client / Computing / Security / Computer security

AirZip® FileSECURE™ White Paper Communicate with Confidence™ Introduction Keeping personal or sensitive information confidential is an essential aspect when doing business today. The disclosure of confidential infor

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:32:31
18Unix / National Security Agency / Security-Enhanced Linux / Computer file / Filesystem permissions / File system / Chmod / Kernel / Unix security / Computing / System software / Computer security

PinUP: Pinning User Files to Known Applications William Enck, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering, The Pennsylv

Add to Reading List

Source URL: www.enck.org

Language: English
19Crime prevention / Data security / Information security / National security / Computer file / Portable Document Format / Filesystem permissions / File system / Email client / Computing / Security / Computer security

PDF Document

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:34:39
20File system / Benchmark / Rm / Computer file / Privilege / Computing / Stevedore / Filesystem permissions

CIS Docker 1.6 Benchmark v1 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and

Add to Reading List

Source URL: benchmarks.cisecurity.org

Language: English - Date: 2015-05-14 10:21:39
UPDATE