Principle of least privilege

Results: 122



#Item
1Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson  Jonathan Anderson

Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson Jonathan Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-08-20 09:49:09
2Opinion: Least Privilege for Solaris  Subject Submitted by File Date

Opinion: Least Privilege for Solaris Subject Submitted by File Date

Add to Reading List

Source URL: us-east.manta.joyent.com

Language: English - Date: 2013-07-25 17:58:00
3Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-18 03:43:58
4PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
5Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
6Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu  Abstract

Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-25 14:11:54
7An Internet Architecture Based on the Principle of Least Privilege Vincent Liu, Seungyeop Han, Adam Lerner, Arvind Krishnamurthy, Thomas Anderson University of Washington  ABSTRACT

An Internet Architecture Based on the Principle of Least Privilege Vincent Liu, Seungyeop Han, Adam Lerner, Arvind Krishnamurthy, Thomas Anderson University of Washington ABSTRACT

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-07-20 14:48:20
    8A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2008-08-18 13:41:12
    9Computer Security Course. Song Dawn  Principle of Least Privilege

    Computer Security Course. Song Dawn Principle of Least Privilege

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-03-21 21:16:29
      10SHILL: A Secure Shell Scripting Language Scott Moore, Christos Dimoulas, Dan King, and Stephen Chong Harvard School of Engineering and Applied Sciences Abstract The Principle of Least Privilege suggests that software

      SHILL: A Secure Shell Scripting Language Scott Moore, Christos Dimoulas, Dan King, and Stephen Chong Harvard School of Engineering and Applied Sciences Abstract The Principle of Least Privilege suggests that software

      Add to Reading List

      Source URL: shill.seas.harvard.edu

      Language: English - Date: 2015-01-27 03:23:54