Filesystem permissions

Results: 508



#Item
1Chmod / Find / Ls / Test / Mkdir / Redirection / TeX / Filesystem permissions / Grep / Computing / Unix / Software

ls – list directory contents File Management Commands - Ctd • • •

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2005-09-19 16:04:04
2Software / Time of check to time of use / Setuid / Symbolic link / Ln / File system / Procfs / Inode / Filesystem permissions / Computing / System software / Unix

Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:51
3Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
4Filesystem permissions / TeX / Application software / Publishing / Typography / Editing

Mac Keith Press Books General Guidelines for Authors and Editors Readership Mac Keith Press publications have a wide international readership. Authors and editors should avoid a parochial approach and consider how issues

Add to Reading List

Source URL: www.mackeithpress.org

Language: English - Date: 2014-06-15 16:55:00
5VMware / Active Directory / Windows / Filesystem permissions / Microsoft SharePoint / VMware ESX / Software / Computing / System software

Product Review 8Man - SUBBED BW.qxd

Add to Reading List

Source URL: www.prianto.co.uk

Language: English - Date: 2015-02-10 10:58:21
6Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
7Android / Embedded Linux / Cloud clients / Android Market / Mobile software / Mobile application development / Filesystem permissions / Principle of least privilege / Android software development / Computing / Software / Smartphones

Curbing Android Permission Creep Timothy Vidas Nicolas Christin Lorrie Faith Cranor

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
8Magento / Computing / Filesystem permissions / File system / Install

INSTALLATION GUIDE Attachments and file upload for products WWW.STORE.BELVG.COM Description:

Add to Reading List

Source URL: www.we-heat.com

Language: English - Date: 2012-11-19 18:06:12
9Computing / Digital library / Web browser / Flickr / Filesystem permissions / Web archiving / World Wide Web / Humanities

Digital Preservation 2014, Washington, JulyFuture of Web Archiving Stephen Abrams California Digital Library

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2014-07-24 09:18:48
10Cloud clients / Embedded Linux / Smartphones / Computer architecture / Rooting / Filesystem permissions / CyanogenMod / Rm / Operating system / Software / Android / Computing

Quantifying the Effects of Removing Permissions from Android Applications Kristen Kennedy, Eric Gustafson, Hao Chen University of California, Davis Abstract With the growing popularity of Android

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2013-06-15 04:04:05
UPDATE