Privilege separation

Results: 79



#Item
71Computer security / Computer network security / Internet / Generic Security Services Application Program Interface / Simple Authentication and Security Layer / SPNEGO / Security Support Provider Interface / Kerberos / Secure Shell / Computing / Internet standards / Cryptographic protocols

GSS-Proxy: Better privilege separation Simo Sorce Principal Software Engineer, Red Hat February 2013

Add to Reading List

Source URL: ssimo.org

Language: English - Date: 2013-05-30 12:12:39
72System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-10-18 17:59:35
73Constitutional law / Politics / President of the United States / Separation of powers / Executive privilege / United States Congress / Congressional oversight / Signing statement / Central Intelligence Agency / Government / Presidency of the United States / Executive branch of the United States government

    STATEMENT OF BRUCE FEIN 

Add to Reading List

Source URL: judiciary.house.gov

Language: English - Date: 2008-07-25 10:51:47
74Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Trusted computing base / Operating system / Multilevel security / Privilege / Computer security / Computer architecture / Computing

LEAST PRIVILEGE IN SEPARATION KERNELS Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Department of Computer Science, Naval Postgraduate School, 833 Dyer Rd., Monterey, CA USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2007-11-15 12:21:15
75System software / User identifier / Group identifier / Setuid / Filesystem permissions / Privilege separation / Principle of least privilege / UGID / Cp / Unix / Computing / Software

The Murky Issue of Changing Process Identity: Revising “Setuid Demystified” Dan Tsafrir†

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:50
76Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

Preventing Privilege Escalation Niels Provos CITI, University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:37
77Law / Westminster system / Parliament of the United Kingdom / Parliament of Singapore / Inquisitorial system / Separation of powers / Parliament / Committee / Parliamentary privilege / Government / Legislatures / Politics

SOME PERSPECTIVES OF THE PARLIAMENTARY INTERNAL SECURITY

Add to Reading List

Source URL: www.disa.ukzn.ac.za

Language: English - Date: 2009-11-03 07:14:36
78System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:50
79Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

PDF Document

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-08-09 20:58:19
UPDATE