Principle of least privilege

Results: 122



#Item
31Computer network security / Ubiquitous computing / Ambient intelligence / Universal Plug and Play / Computer security / Principle of least privilege / Framework Programmes for Research and Technological Development / Smart device / Computing / Technology / Security

Enabling Secure Ubiquitous Interactions Kevin Eustice, Shane Markstrum, Venkatraman Ramakrishna, Peter Reiher, Leonard Kleinrock, and Gerald Popek Laboratory for Advanced Systems Research, Department of Computer Science,

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-10-29 13:32:46
32Computer network security / Mandatory access control / Cloud computing / Database / Middleware / Principle of least privilege / Industry Foundation Classes / Security / Computer security / Computing

1 Investigating the Potential of Information Flow Control as a Cloud Security Technology Jean Bacon, Fellow, IEEE, Thomas Pasquier, Member, IEEE, Jatinder Singh, Member, IEEE, Olivier Hermant and David Eyers, Member, IE

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:44:42
33Embedded Linux / Smartphones / Free software / Computer file / Operating system / Rooting / Principle of least privilege / Android Market / Android Cloud to Device Messaging Service / Computing / Android / Software

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
34Embedded Linux / Smartphones / Free software / Computer file / Operating system / Rooting / Principle of least privilege / Android Market / Android Cloud to Device Messaging Service / Computing / Android / Software

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
35System software / Grep / User identifier / Group identifier / Ps / Shadow password / Passwd / Nl / Principle of least privilege / Unix / Software / Computing

Programmation Systèmes Cours 4 — Runtime user management Stefano Zacchiroli Laboratoire PPS, Université Paris Diderot - Paris 7

Add to Reading List

Source URL: upsilon.cc

Language: English - Date: 2015-01-01 06:25:24
36Computer security / Authorization / Capability-based security / Operating system / Process / Software design pattern / File system / Principle of least privilege / Process management / Security / Computing / Access control

Patterns for Operating Systems Access Control Eduardo B. Fernandez Dept. of Computer Science and Engineering

Add to Reading List

Source URL: www.hillside.net

Language: English - Date: 2004-02-16 17:18:52
37Crime prevention / National security / Database management systems / Role-based access control / Mandatory access control / Principle of least privilege / Label / Database / Internet privacy / Security / Computer security / Access control

An Enhanced IFC Label Model to meet Application Policy Requirements. Thomas F. J.-M. Pasquier1 , Olivier Hermant2 , Jean Bacon1 1 University of Cambridge, United Kingdom,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:49:17
38Computer virus / Macro virus / Malware / CapDesk / Microsoft Windows / Antivirus software / Spyware / Microsoft Excel / Principle of least privilege / System software / Software / Rogue software

Polaris: Virus Safe Computing for Windows XP

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2004-12-20 19:25:01
39Software testing / Information theory / Principle of least privilege / Computer network security / Central processing unit / Sandbox / Vulnerability / Ring / Fetch / System software / Computer security / Software

Security-Oriented Analysis of Application Programs (SOAAP) Robert Watson, Khilan Gudka, Steven Hand, Ben Laurie (Google), Anil Madhavapeddy Workshop on Adaptive Host and Network Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-17 04:46:16
40Human–computer interaction / Firefox / Google Chrome / Web browser / JavaScript / Privilege escalation / Principle of least privilege / World Wide Web / Cascading Style Sheets / Software / Computing / Software testing

A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2014-03-14 01:33:25
UPDATE