![System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control](https://www.pdfsearch.io/img/01f5c88feb4ff258f0d6ab085cc0ad26.jpg) Date: 2014-03-25 14:11:54System software Software Computer architecture System administration Unix Access control Setuid Privilege separation Fstab File system permissions Principle of least privilege Mandatory access control | | Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu AbstractAdd to Reading ListSource URL: www3.cs.stonybrook.eduDownload Document from Source Website File Size: 214,00 KBShare Document on Facebook
|