Principle of least privilege

Results: 122



#Item
61Unix / Access control / System administration / Cryptographic software / Secure Shell / Privilege separation / OpenSSH / Privilege / Principle of least privilege / System software / Computer security / Software

CITI Technical Report[removed]Preventing Privilege Escalation Niels Provos [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-08-05 18:22:53
62Cross-site scripting / JavaScript / Firefox / Chrome Web Store / Code injection / Internet Explorer / Principle of least privilege / Safari / Add-on / Software / Google Chrome / News aggregators

An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
63Malware / Computer security / Windows XP / Active Directory / Windows Registry / Spyware / Principle of least privilege / Lua / Windows / Software / System software / Microsoft Windows

20 Applying the Principle of Least Privilege to User Accounts on Windows XP Template User Instructions iii 20 Applying the Principle of Least Privilege to User Accounts on Windows XP

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-01-18 03:00:00
64Object-oriented programming / Identity management / Capability-based security / Access Control Matrix / Access token / Principle of least privilege / File system / Class / Computer security / Security / Access control

Practical Least Privilege Security Reader Chapter 7: concept 0.3 Jan[removed]

Add to Reading List

Source URL: polacanthus.net

Language: English - Date: 2008-01-25 08:19:46
65Chroot / User identifier / Setuid / Privilege separation / Secure Shell / Principle of least privilege / OpenSSH / Group identifier / Filesystem permissions / Unix / System software / Software

Model Checking One Million Lines of C Code∗ Hao Chen Drew Dean David Wagner UC Berkeley SRI International

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:22
66Mathematics / Turing machine / Models of computation / Theory of computation / Alan Turing / Principle of least privilege / Operating system / Halting problem / Theoretical computer science / Computability theory / Computer science

Part IV Access Control Confidentiality and integrity are often enforced using a form of authorization known as access control, which involves the following assumptions. • Predefined operations are the sole means by whi

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 22:02:07
67Design / Computer security / User interface / Virtual reality / Usability / Trusted path / Principle of least privilege / User / End-user development / Computing / Human–computer interaction / Software

User Interaction Design for Secure Systems Ka-Ping Yee Report No. UCB/CSD[removed]May 2002

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2002-05-31 13:32:33
68Principle of least privilege / Trusted computing base / Ring / Institute of Electrical and Electronics Engineers / Privilege / Computing / Security / Computer security / Information theory

Least Privilege Least Privilege and More With new methods for enforcing security policies comes the opportunity to formulate application-specific policies. But

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 11:09:48
69Antivirus software / Computer virus / Malware / Macro virus / CapDesk / Microsoft Windows / Spyware / Microsoft Excel / Principle of least privilege / System software / Software / Computing

Polaris: Toward Virus Safe Computing for Windows XP Marc Stiegler, Alan H. Karp, Ka-Ping Yee1, Mark Miller2 Hewlett-Packard Laboratories Palo Alto, California Viruses, those nasty pieces of software that can run when you

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2004-12-13 10:58:46
70Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
UPDATE