Skip to search formSkip to main contentSkip to account menu

Privilege separation

Known as: Dropping root, Privileges drop, Privileges-drop 
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The aim of this work is to propose a new methodology to relate Ductile Cast Irons (DCIs) wear behavior with the separation… 
2015
2015
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry… 
2013
2013
Virtual machine security issues have been the focus of attention. The permissions of traditional administrative domain Dom0 are… 
2010
2010
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security… 
2007
2007
Abstract : A least privilege separation kernel (LPSK) is part of a long-term project known as the Trusted Computing Exemplar (TCX… 
2006
2006
If trusted processes' secrets or privileged system objects such as file handles are leaked to an untrusted process, the result… 
2006
2006
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems… 
2005
2005
In this paper we discuss, in some depth, our restricted implementation of privilege separation for the Condor ® system ([1], [2… 
2004
2004
Abstract : We extend the separation kernel abstraction to represent the enforcement of the principle of least privilege. In…