File system permissions

Results: 81



#Item
11Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu  Abstract

Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-25 14:11:54
12Cognitive Disconnect: Understanding Facebook Connect Login Permissions Nicky Robinson Joseph Bonneau

Cognitive Disconnect: Understanding Facebook Connect Login Permissions Nicky Robinson Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-09-28 21:08:31
13Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:51
14INSTALLATION GUIDE Attachments and file upload for products WWW.STORE.BELVG.COM  Description:

INSTALLATION GUIDE Attachments and file upload for products WWW.STORE.BELVG.COM Description:

Add to Reading List

Source URL: www.we-heat.com

Language: English - Date: 2012-11-19 18:06:12
15Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 4 Access Control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
16CHAPTER  4 Access Control Going all the way back to early time-sharing systems we systems

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
17AirZip® FileSECURE™ White Paper Communicate with Confidence™ Introduction Keeping personal or sensitive information confidential is an essential aspect when doing business today. The disclosure of confidential infor

AirZip® FileSECURE™ White Paper Communicate with Confidence™ Introduction Keeping personal or sensitive information confidential is an essential aspect when doing business today. The disclosure of confidential infor

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:32:31
18PinUP: Pinning User Files to Known Applications William Enck, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering, The Pennsylv

PinUP: Pinning User Files to Known Applications William Enck, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering, The Pennsylv

Add to Reading List

Source URL: www.enck.org

Language: English
19

PDF Document

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:34:39
20CIS Docker 1.6 Benchmark v1 http://benchmarks.cisecurity.org  The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and

CIS Docker 1.6 Benchmark v1 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and

Add to Reading List

Source URL: benchmarks.cisecurity.org

Language: English - Date: 2015-05-14 10:21:39