Separation principle

Results: 46



#Item
11Programming paradigms / CapDesk / Principle of least privilege / Object-capability model / Trusted computing base / Kernel / Separation of concerns / Capability-based security / Abstraction / Security / Computer security / Access control

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
12Linear-quadratic-Gaussian control / Kalman filter / Optimal control / Separation principle / Flight dynamics / Elevon / Control system / State observer / Aircraft flight control system / Systems theory / Control theory / Cybernetics

Linear Quadratic Optimal Control Synthesis for a UAV Fendy Santoso, Ming Liu and Gregory Egan Department of Electrical & Computer Systems Engineering Monash University, VIC 3800 Melbourne, Australia Abstract

Add to Reading List

Source URL: www.eganfamily.id.au

Language: English - Date: 2007-09-25 07:13:14
13Science / State space / State variable / Observability / State observer / Separation principle / Control theory / Systems theory / Cybernetics

6.241J Course Notes, Chapter 29: Observers, model-based controllers

Add to Reading List

Source URL: ocw.mit.edu

Language: English - Date: 2015-03-15 16:14:41
14Linear-quadratic-Gaussian control / Kalman filter / Optimal control / Separation principle / Flight dynamics / Control system / Elevon / Step response / Linear-quadratic regulator / Systems theory / Control theory / Cybernetics

Department of Electrical and Computer Systems Engineering Technical Report MECSE[removed]

Add to Reading List

Source URL: www.eganfamily.id.au

Language: English - Date: 2008-03-26 22:49:12
15Unix / Access control / System administration / Cryptographic software / Secure Shell / Privilege separation / OpenSSH / Privilege / Principle of least privilege / System software / Computer security / Software

CITI Technical Report[removed]Preventing Privilege Escalation Niels Provos [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-08-05 18:22:53
16Political philosophy / Law / Politics of the United Kingdom / Sovereignty / United Kingdom constitution / Separation of powers / Constitutionalism / Parliamentary sovereignty / Federalism / Constitutional law / Philosophy of law / Political science

15. Delegating Legislative Power Contents A constitutional principle Protections from statutory encroachment Australian Constitution Justifications for delegating legislative power

Add to Reading List

Source URL: www.alrc.gov.au

Language: English - Date: 2014-12-09 19:12:54
17Political philosophy / Law / Politics of the United Kingdom / Sovereignty / United Kingdom constitution / Separation of powers / Constitutionalism / Parliamentary sovereignty / Federalism / Constitutional law / Philosophy of law / Political science

15. Delegating Legislative Power Contents A constitutional principle Protections from statutory encroachment Australian Constitution Justifications for delegating legislative power

Add to Reading List

Source URL: www.alrc.gov.au

Language: English - Date: 2014-12-09 19:12:54
18Chroot / User identifier / Setuid / Privilege separation / Secure Shell / Principle of least privilege / OpenSSH / Group identifier / Filesystem permissions / Unix / System software / Software

Model Checking One Million Lines of C Code∗ Hao Chen Drew Dean David Wagner UC Berkeley SRI International

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:22
19System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2004-08-30 22:13:54
20Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Thread / Trusted computing base / Privilege separation / Privilege / Computer architecture / Computer security / Computing

Microsoft Word - C5_077_LEVIN.doc

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-03-04 17:16:50
UPDATE