Principle of least privilege

Results: 122



#Item
91Computer security / Linux kernel / Operating system kernels / Kernel / Loadable kernel module / Ioctl / Rootkit / Architecture of Windows NT / Principle of least privilege / Computer architecture / System software / Computing

Software fault isolation with API integrity and multi-principal modules Yandong Mao, Haogang Chen, Dong Zhou† , Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek MIT CSAIL, † Tsinghua University IIIS A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
92Systrace / Computer security / Unix / Kernel / System call / Operating system / Principle of least privilege / Microkernel / Chroot / System software / Software / Computer architecture

Improving Host Security with System Call Policies Niels Provos Center for Information Technology Integration University of Michigan [removed] Abstract

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-08-09 20:58:49
93Information security / Federal Information Security Management Act / Authorization / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Access control / Freedom of information legislation / Separation of duties / Principle of least privilege / Computer security / Security / Data security

INFORMATION SECURITY – INTERIM ACCESS CONTROL PROCEDURES

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2012-12-05 11:33:20
94Auditing / Access control / Identity management / Information technology management / Separation of duties / Principle of least privilege / Superuser / Information security audit / Security / Computer security / Data security

Microsoft Word[removed]DFS STARS.docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2012-01-09 07:33:48
95National security / Computer network security / Crime prevention / Physical security / Security controls / Threat / Authorization / Access control / Principle of least privilege / Security / Computer security / Public safety

PHYSICAL AND LOGICAL ACCESS SECURITY POLICY 1.0 SCOPE

Add to Reading List

Source URL: www.chinleusd.k12.az.us

Language: English - Date: 2012-10-15 17:05:53
96Data security / Information security / National security / Password / Authorization / Superuser / Principle of least privilege / Authentication / Security / Computer security / Access control

Microsoft Word - OMAO Access Control _AC_ Policy June 28, 2012 Draft.docx

Add to Reading List

Source URL: www.moc.noaa.gov

Language: English - Date: 2013-01-11 14:32:23
97Embedded operating systems / Virtual machines / Computer security / System Management Mode / Ring / Accelerated Graphics Port / Hypervisor / Principle of least privilege / Kernel / System software / Computing / Computer architecture

Programmed I/O accesses: a threat to Virtual Machine Monitors? Loïc Duflot & Laurent Absil Central Department for Information Systems Security SGDN/DCSSI 51 boulevard de la Tour Maubourg[removed]Paris

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:24
98Central processing unit / Ring / Mandatory access control / Principle of least privilege / System call / Operating system / Kernel / Privilege / Process / Computer security / Computing / System software

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Execution Policies

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2003-03-19 11:11:30
99Separation kernel / Kernel / Principle of least privilege / Ring / Linux kernel / Operating system / Multilevel security / Loadable kernel module / Thread / Computer architecture / System software / Software

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-08-07 10:32:43
100Access control / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Principle of least privilege / Computer security / Computing / Security

ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38
UPDATE