Principle of least privilege

Results: 122



#Item
31Enabling Secure Ubiquitous Interactions Kevin Eustice, Shane Markstrum, Venkatraman Ramakrishna, Peter Reiher, Leonard Kleinrock, and Gerald Popek Laboratory for Advanced Systems Research, Department of Computer Science,

Enabling Secure Ubiquitous Interactions Kevin Eustice, Shane Markstrum, Venkatraman Ramakrishna, Peter Reiher, Leonard Kleinrock, and Gerald Popek Laboratory for Advanced Systems Research, Department of Computer Science,

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-10-29 13:32:46
321  Investigating the Potential of Information Flow Control as a Cloud Security Technology Jean Bacon, Fellow, IEEE, Thomas Pasquier, Member, IEEE, Jatinder Singh, Member, IEEE, Olivier Hermant and David Eyers, Member, IE

1 Investigating the Potential of Information Flow Control as a Cloud Security Technology Jean Bacon, Fellow, IEEE, Thomas Pasquier, Member, IEEE, Jatinder Singh, Member, IEEE, Olivier Hermant and David Eyers, Member, IE

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:44:42
33White Paper  Secure Coding for Android Applications  White Paper

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
34White Paper  Secure Coding for Android Applications  White Paper

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
35Programmation Systèmes Cours 4 — Runtime user management Stefano Zacchiroli  Laboratoire PPS, Université Paris Diderot - Paris 7

Programmation Systèmes Cours 4 — Runtime user management Stefano Zacchiroli Laboratoire PPS, Université Paris Diderot - Paris 7

Add to Reading List

Source URL: upsilon.cc

Language: English - Date: 2015-01-01 06:25:24
36Computer security / Authorization / Capability-based security / Operating system / Process / Software design pattern / File system / Principle of least privilege / Process management / Security / Computing / Access control

Patterns for Operating Systems Access Control Eduardo B. Fernandez Dept. of Computer Science and Engineering

Add to Reading List

Source URL: www.hillside.net

Language: English - Date: 2004-02-16 17:18:52
37An Enhanced IFC Label Model to meet Application Policy Requirements. Thomas F. J.-M. Pasquier1 , Olivier Hermant2 , Jean Bacon1 1  University of Cambridge, United Kingdom,

An Enhanced IFC Label Model to meet Application Policy Requirements. Thomas F. J.-M. Pasquier1 , Olivier Hermant2 , Jean Bacon1 1 University of Cambridge, United Kingdom,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:49:17
38Polaris: Virus Safe Computing for Windows XP

Polaris: Virus Safe Computing for Windows XP

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2004-12-20 19:25:01
39Security-Oriented Analysis of Application Programs (SOAAP) Robert Watson, Khilan Gudka, Steven Hand, Ben Laurie (Google), Anil Madhavapeddy Workshop on Adaptive Host and Network Security

Security-Oriented Analysis of Application Programs (SOAAP) Robert Watson, Khilan Gudka, Steven Hand, Ben Laurie (Google), Anil Madhavapeddy Workshop on Adaptive Host and Network Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-17 04:46:16
40A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2014-03-14 01:33:25