Principle of least privilege

Results: 122



#Item
41Cross-site scripting / JavaScript / Firefox / Chrome Web Store / Code injection / Internet Explorer / Principle of least privilege / Safari / Add-on / Software / Google Chrome / News aggregators

An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

Add to Reading List

Source URL: nicholas.carlini.com

Language: English - Date: 2013-10-16 18:28:56
42System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
43Computer security / Access control / Object-oriented programming / Capability-based security / Object-capability model / Ambient authority / Principle of least privilege / Java / Object / Computing / Security / Software engineering

I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
44National security / Privileged password management / Principle of least privilege / Malware / Information security / Password / Privilege / Ring / Superuser / Security / Computer security / Crime prevention

Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2015-03-24 12:08:30
45Software / Setuid / Principle of least privilege / Privilege / Software bug / Chmod / Environment variable / Computing / Unix / System software

Writing Safe Setuid Programs Matt Bishop Department of Computer Science University of California at Davis Davis, CA[removed]phone[removed]

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-03-12 20:42:03
46EROS / Capability-based security / Kernel / Operating system / Principle of least privilege / KeyKOS / Trusted computing base / Persistence / Ring / Computer architecture / Computing / Computer security

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
47Intellectual property law / Computer security / Database management systems / Oracle Corporation / Oracle Database / Database security / Copyright / Principle of least privilege / Database / Information / Data / Software

Microsoft PowerPoint - Bletchley_Park

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2011-09-19 07:51:25
48Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
49Programming paradigms / CapDesk / Principle of least privilege / Object-capability model / Trusted computing base / Kernel / Separation of concerns / Capability-based security / Abstraction / Security / Computer security / Access control

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
50Windows Vista / Installation software / Remote administration software / ScriptLogic / System administration / Privilege / Principle of least privilege / User Account Control / Comparison of privilege authorization features / System software / Microsoft Windows / Software

Desktop Management OVERVIEW UNLOCK YOUR NETWORK YET MAINTAIN SECURITY Securing your network is a top priority.

Add to Reading List

Source URL: enclavedatasolutions.com

Language: English - Date: 2011-03-27 21:52:32
UPDATE