Principle of least privilege

Results: 122



#Item
21Smartphones / Android / Computer architecture / Access Control Matrix / Filesystem permissions / Principle of least privilege / Kernel / Operating system / Android Market / Computing / Software / Embedded Linux

Networking and Security Research Center Technical Report NAS-TRMitigating Android Software Misuse Before It

Add to Reading List

Source URL: www.enck.org

Language: English
22Human–computer interaction / Firefox / Google Chrome / Web browser / JavaScript / Privilege escalation / Principle of least privilege / World Wide Web / Cascading Style Sheets / Software / Computing / Software testing

A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
23Exploit / Systems engineering / Shellcode / Principle of least privilege / Malware

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:28:32
24Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
25Asbestos / Mandatory access control / Multilevel security / Kernel / Process management / Server / Operating system / EROS / Principle of least privilege / Computer security / Computing / Computer architecture

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
26Cyber-Ark / Malware / Principle of least privilege / Privileged Identity Management / Security information and event management / Privilege / Access control / Ring / Database activity monitoring / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2014-09-04 04:59:36
27Inter-process communication / Process / Process management / Mandatory access control / Asbestos / Message passing / Principle of least privilege / Microkernel / Operating system / Computing / Computer architecture / Concurrent computing

Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-08-17 14:44:03
28Cyberwarfare / CapDesk / Principle of least privilege / Vulnerability / Firewall / JavaScript / Computer network security / Computer security / Computing

BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:57:04
29Security information and event management / Network security / Privilege / Computing / Privileged Identity Management / Database activity monitoring / Computer security / Security / Principle of least privilege

WHITE PAPER Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
30Access control / Data types / Primitive types / Capability-based security / Object-capability model / EROS / Capability-based addressing / Pointer / Principle of least privilege / Computer security / Security / Computing

unknown2004-10-23T01:01:00 unknown2004-10-23T01:01:00 unknown2004-10-23T00:34:00^ unknown2004-10-23T00:35:00^

Add to Reading List

Source URL: erights.org

Language: English - Date: 2005-10-31 19:06:12
UPDATE