Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,553 papers from all fields of science
Search
Sign In
Create Free Account
Privilege separation
Known as:
Dropping root
, Privileges drop
, Privileges-drop
Expand
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Access token
Capability-based security
Comparison of BSD operating systems
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An Approach Based on the Exploratory Data Analysis to Relate the Wear Behavior with the Microstructure of Ductile Cast Irons
Jesús A. Basurto-Hurtado
,
L. A. Morales-Hernández
,
R. Osornio-Ríos
,
A. Dominguez-Gonzalez
2016
Corpus ID: 55006187
The aim of this work is to propose a new methodology to relate Ductile Cast Irons (DCIs) wear behavior with the separation…
Expand
2015
2015
Cache Storage Attacks
B. Brumley
The Cryptographer's Track at RSA Conference
2015
Corpus ID: 39605115
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry…
Expand
2013
2013
Protecting the Security and Privacy of the Virtual Machine through Privilege Separation
Cong Yu
,
Li Li
,
Kui Wang
,
Wenqian Yu
2013
Corpus ID: 33320258
Virtual machine security issues have been the focus of attention. The permissions of traditional administrative domain Dom0 are…
Expand
2010
2010
Structuring Protocol Implementations to Protect Sensitive Data
Petr Marchenko
,
B. Karp
USENIX Security Symposium
2010
Corpus ID: 12458877
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security…
Expand
2007
2007
Alloy experiments for a least privilege separation kernel
David A. Phelps
2007
Corpus ID: 60072609
Abstract : A least privilege separation kernel (LPSK) is part of a long-term project known as the Trusted Computing Exemplar (TCX…
Expand
2006
2006
Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications
U. Shankar
,
D. Wagner
IEEE International Conference on Communications
2006
Corpus ID: 7332910
If trusted processes' secrets or privileged system objects such as file handles are leaked to an untrusted process, the result…
Expand
2006
2006
Object capabilities for security
D. Wagner
ACM Workshop on Programming Languages and…
2006
Corpus ID: 30367799
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems…
Expand
2005
2005
Implementing privilege separation in the Condor ® system
B. Beckles
2005
Corpus ID: 10121620
In this paper we discuss, in some depth, our restricted implementation of privilege separation for the Condor ® system ([1], [2…
Expand
2004
2004
A Least Privilege Model for Static Separation Kernels
T. Levin
,
C. Irvine
,
Thuy D. Nguyen
2004
Corpus ID: 9713238
Abstract : We extend the separation kernel abstraction to represent the enforcement of the principle of least privilege. In…
Expand
1996
1996
"Separation preparation" : developing a training program for families anticipating military hardship separation tours, for army-wide implementation
Robert Glenn Leroe
1996
Corpus ID: 152860410
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE