Principle of least privilege

Results: 122



#Item
41An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

Add to Reading List

Source URL: nicholas.carlini.com

Language: English - Date: 2013-10-16 18:28:56
42Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
43I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
44Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2015-03-24 12:08:30
45Writing Safe Setuid Programs Matt Bishop Department of Computer Science University of California at Davis Davis, CA[removed]phone[removed]

Writing Safe Setuid Programs Matt Bishop Department of Computer Science University of California at Davis Davis, CA[removed]phone[removed]

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-03-12 20:42:03
46focus  building software securely EROS: A Principle-Driven Operating System from the

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
47Microsoft PowerPoint - Bletchley_Park

Microsoft PowerPoint - Bletchley_Park

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2011-09-19 07:51:25
48BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
49The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
50Desktop Management  OVERVIEW UNLOCK YOUR NETWORK YET MAINTAIN SECURITY Securing your network is a top priority.

Desktop Management OVERVIEW UNLOCK YOUR NETWORK YET MAINTAIN SECURITY Securing your network is a top priority.

Add to Reading List

Source URL: enclavedatasolutions.com

Language: English - Date: 2011-03-27 21:52:32