Principle of least privilege

Known as: Least user access, POLP, Principle of Least Authority 
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Consumer devices are increasingly being used to perform security and privacy critical tasks. The software used to perform these… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The Android platform has about 130 application level permissions that govern access to resources. The determination of which… (More)
Is this relevant?
2011
2011
The principle of least privilege in role-based access control (RBAC) is an important area of research. There are two crucial… (More)
  • table I
  • table II
  • table III
  • table IV
  • table VI
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
The principle of least privilege is a well known design principle to which access control models and systems should adhere. In… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Though system security would benefit if programmers routinely followed the principle of least privilege [24], the interfaces… (More)
  • figure 1
Is this relevant?
2003
2003
Operating system access control mechanisms are intended to protect programs and data from corruption, yet still allow sharing of… (More)
Is this relevant?