Security descriptor

Results: 15



#Item
1fig-capsicum-processes.graffle

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-09 05:43:31
2Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
3Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995  Checking for Race Conditions in File Accesses

Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995 Checking for Race Conditions in File Accesses

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:49
4CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
5Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application

Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-15 18:26:11
6Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller  Stephanie Jones

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
7Authentication & Authorization Sean Kelly Object Oriented Data TechnologyNASA JET PROPULSION LABORATORY

Authentication & Authorization Sean Kelly Object Oriented Data TechnologyNASA JET PROPULSION LABORATORY

Add to Reading List

Source URL: oodt.jpl.nasa.gov

Language: English - Date: 2005-11-03 17:50:07
8Proper: Privileged Operations in a Virtualised System Environment Steve Muir, Larry Peterson, Marc Fiuczynski Princeton University Justin Cappos, John Hartman University of Arizona

Proper: Privileged Operations in a Virtualised System Environment Steve Muir, Larry Peterson, Marc Fiuczynski Princeton University Justin Cappos, John Hartman University of Arizona

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:19
9Management systems / Network management / System administration / Windows NT architecture / Windows Management Instrumentation / Security descriptor / WMI / Windows XP / Architecture of Windows NT / Microsoft Windows / System software / Software

Kernel WMI Object Security - 10 Kernel WMI Object Security June 13, 2006  

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-05-22 20:32:59
10UNCLASSIFIED Report Number: C4-052R-00 Guide to Securing Microsoft ® Windows 2000 Group Policy:

UNCLASSIFIED Report Number: C4-052R-00 Guide to Securing Microsoft ® Windows 2000 Group Policy:

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:31