Back to Results
First PageMeta Content
Information theory / Principle of least privilege / Ring / Trusted computing base / Authorization / Operating system / Reference monitor / Privilege / Security / Computer security / Access control


Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853
Add to Reading List

Document Date: 2003-07-02 11:18:02


Open Document

File Size: 194,30 KB

Share Result on Facebook

City

Cambridge / New York / Hanscom / /

Company

IBM / Needham / Microsoft / /

Country

Canada / United Kingdom / /

Facility

Hanscom Air Force Base / /

IndustryTerm

word processor / replacement algorithms / mathematical tools / web browsers / extensible systems / software interpreters / software leads / trusted computing base / type systems / memory management hardware / Computer security technology / Protection systems / /

OperatingSystem

Multics / Microsoft Windows / /

Organization

Defense Advanced Research Projects Agency / National Science Foundation / Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca / U.S. Government / Association for Computing Machinery / /

Person

E. Gun Sirer / Mike Schroeder / Andrew Myers / Ulfar Erlingsson / Roger Needham / Fred B. Schneider / Greg Morrisett / Lorenzo Alvisi / /

/

Position

editor / word processor / Butler / program instruction Interpreter / interpreter / /

ProgrammingLanguage

Java / C / /

ProvinceOrState

New York / Massachusetts / Ontario / /

Technology

Java / Computer security technology / replacement algorithms / virtual memory system / plug and play / virtual memory / Operating system / operating systems / word processor / /

SocialTag