Principle of least privilege

Results: 122



#Item
21Networking and Security Research Center Technical Report NAS-TRMitigating Android Software Misuse Before It

Networking and Security Research Center Technical Report NAS-TRMitigating Android Software Misuse Before It

Add to Reading List

Source URL: www.enck.org

Language: English
22A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
23

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:28:32
24Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
25Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
26

PDF Document

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2014-09-04 04:59:36
27Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-08-17 14:44:03
28BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:57:04
29WHITE PAPER  Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

WHITE PAPER Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
30Access control / Data types / Primitive types / Capability-based security / Object-capability model / EROS / Capability-based addressing / Pointer / Principle of least privilege / Computer security / Security / Computing

unknown2004-10-23T01:01:00 unknown2004-10-23T01:01:00 unknown2004-10-23T00:34:00^ unknown2004-10-23T00:35:00^

Add to Reading List

Source URL: erights.org

Language: English - Date: 2005-10-31 19:06:12