Back to Results
First PageMeta Content
Access control / Cross-platform software / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Computing / Computer security / Security


ACLs don’t Abstract The ACL model is unable to make correct access decisions for interactions involving more than two principals, since required information is not retained
Add to Reading List

Document Date: 2009-04-30 13:16:38


Open Document

File Size: 152,29 KB

Share Result on Facebook

Company

Distributed Systems / /

IndustryTerm

software system / contemporary systems / remote server / Web applications / web-key paper / Web users / Web surfers / Web site operator / partner site / victim site / deputy software / web-key / Web application / Web browser / Web browser message sender identifier process UID / legitimate site / web-cam recording / stock broker / victim applications / Web protocols / server-side infrastructure / Web server / capability protocol / mainstream operating systems / software agent / /

OperatingSystem

Unix / Unix-like / /

Organization

African Union / /

Person

Compiler Web / /

Position

broker / application programmer / first author / co-author / ACL model for interactions involving more than two principals / stock broker / /

Product

SQL injection / /

ProgrammingLanguage

SQL / Java / php / JavaScript / HTML / /

ProvinceOrState

Arkansas / /

Technology

Horton capability protocol / Java / Unix / API / HTTP / HTML / operating systems / Web protocols / access control list / /

SocialTag