Principle of least privilege

Results: 122



#Item
1Software / Computing / Computer security / Software testing / Data security / Sandbox / Compartmentalization / Cellular compartment / Seccomp / Compartment / Vulnerability / Principle of least privilege

Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson Jonathan Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-08-20 09:49:09
2System calls / Computer security / Information theory / Principle of least privilege / Privilege / Solaris / Linux kernel / Protection ring / File system / Device driver / Sun Microsystems / Procfs

Opinion: Least Privilege for Solaris Subject Submitted by File Date

Add to Reading List

Source URL: us-east.manta.joyent.com

Language: English - Date: 2013-07-25 17:58:00
3Humancomputer interaction / Usability / Human communication / Computer security / Ergonomics / User interface / Principle of least privilege / User / Error message / User interface design / Secure by default

Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-18 03:43:58
4Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
5Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
6System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control

Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-25 14:11:54
7

An Internet Architecture Based on the Principle of Least Privilege Vincent Liu, Seungyeop Han, Adam Lerner, Arvind Krishnamurthy, Thomas Anderson University of Washington ABSTRACT

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-07-20 14:48:20
    8Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

    A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2008-08-18 13:41:12
    9

    Computer Security Course. Song Dawn Principle of Least Privilege

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-03-21 21:16:29
      10

      SHILL: A Secure Shell Scripting Language Scott Moore, Christos Dimoulas, Dan King, and Stephen Chong Harvard School of Engineering and Applied Sciences Abstract The Principle of Least Privilege suggests that software

      Add to Reading List

      Source URL: shill.seas.harvard.edu

      Language: English - Date: 2015-01-27 03:23:54
        UPDATE