Back to Results
First PageMeta Content
Access control / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Principle of least privilege / Computer security / Computing / Security


ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract
Add to Reading List

Document Date: 2009-04-30 13:16:38


Open Document

File Size: 153,43 KB

Share Result on Facebook

Company

Distributed Systems / /

/

IndustryTerm

software system / contemporary systems / remote server / Web applications / web-key paper / Web users / Web surfers / Web site operator / partner site / victim site / web-key / Web application / Web browser / Web browser message sender identifier process UID / legitimate site / web-cam recording / stock broker / victim applications / Web protocols / server-side infrastructure / Web server / capability protocol / mainstream operating systems / software agent / /

OperatingSystem

Unix / Unix-like / /

Organization

African Union / /

Person

Compiler Web / Tyler Close / /

Position

author / broker / application programmer / first author / co-author / ACL model for interactions involving more than two principals / stock broker / /

Product

SQL injection / /

ProgrammingLanguage

SQL / Java / php / JavaScript / HTML / /

ProvinceOrState

Arkansas / /

Technology

Horton capability protocol / Java / Unix / API / HTTP / HTML / operating systems / Web protocols / access control list / /

SocialTag