Back to Results
First PageMeta Content
Computer security / Inter-process communication / Access control / Security descriptor / Local Procedure Call / Access token / Object Manager / Security Identifier / Windows Registry / Microsoft Windows / Computing / Windows NT architecture


Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application
Add to Reading List

Document Date: 2008-07-15 18:26:11


Open Document

File Size: 213,65 KB

Share Result on Facebook

City

Washington / DC / Los Angeles / New York / /

Company

Springer-Verlag New York Inc. / Enabling Technologies / ACM Press / Microsoft / SID / /

Country

United States / /

Facility

ALPC Port / /

IndustryTerm

software security risk / Formal software verification / software security assessment instrument / security auditor / software security analysis / trustworthy computing security development lifecycle / software verification techniques / software verification / /

OperatingSystem

Windows Vista / Microsoft Windows / Windows Server 2008 / /

Organization

IEEE Computer Society / /

Person

John D. Powell / David P. Gilliam / Matt Miller Leviathan / WD WD AU WD AU / Thomas Ball / John Lambert / George Fink / Prasad Naldurg / Sriram K. Rajamani / John C. Kelly / Stefan Schwoon / Matt Bishop / Martin Ouimet / Gerard J. Holzmann / /

Position

object manager / aide / model and auditor / manager callbacks / actor / manager in the Windows kernel / administrator / auditor / unified lattice model for static analysis / security auditor / Dean / and D. Wagner / /

ProgrammingLanguage

DC / /

ProvinceOrState

New York / California / /

Technology

API / http / pdf / access control list / /

URL

http /

SocialTag