نتایج جستجو برای: privilege

تعداد نتایج: 6645  

2006
JAMES FORREST KEVIN DUNN

Tensions between acceptance of policies aimed at creating a multicultural society and British (Anglo or Anglo-Celtic) Australians concerned about loss of their privileged position as members of the dominant society have been an important feature of political debate in Australia in recent years. There is, however, a paucity of empirical evidence available to assess the extent of recognition of A...

2012
Nan Li Tao Wang Daishu Han

The testis presents a special immunological environment, considering its property of immune privilege that tolerates allo- and auto-antigens. Testicular immune privilege was once believed to be mainly based on the sequestration of antigens from the immune system by the blood-testis barrier in the seminiferous epithelium. Substantial evidence supports the view that the combination of physical st...

2017
Eric LeGresley Kelley Lee

BACKGROUND Tobacco companies have a documented history of attempting to hide information from public scrutiny, including inappropriate privilege claims. The 1998 Minnesota Consent Judgement created two depositories to provide public access to discovered documents. Users raised concerns about the access conditions and ongoing integrity of the Guildford Depository collection operated until 2015 b...

2004
Rafae Bhatti Elisa Bertino Arif Ghafoor

1. Motivation The ability to federate identity across organizations while maintaining access rights and privileges poses a major challenge [5]. The solution is federated identity and privilege management. However, almost all well-known such schemes have their drawbacks. Additionally, the development of Web-based federated identity solutions has advanced more rapidly as compared to the Web-based...

2010
Ru Zhou Rachel R Caspi

The eye attempts to limit local immune and inflammatory responses to preserve vision. This phenomenon, known as ocular immune privilege, is mediated by a combination of local and systemic mechanisms. While immune privilege is believed to protect the eye from day-to-day inflammatory insults, it is not absolute and its mechanisms are still incompletely understood.

Journal: :IEEE Security & Privacy 2003
Fred B. Schneider

“f) Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job. Primarily, this principle limits the damage that can result from an accident or error. It also reduces the number of potential interactions among privileged programs to the minimum for correct operation, so that unintentional, unwanted, or improper uses...

2010
Yasha Chen Jun Hu Xinmao Gai Yu Sun

Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be inter...

2007
Dhananjay Bapat Kevin R. B. Butler Patrick D. McDaniel

Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to protected resources, we can mitigate the threats against the application. Previous examinations of privilege separation either entailed significant manual effort or required access to the source code. We consider a metho...

2008
Matt Miller

Matt Miller presented his work on automatically discovering data flows between trust boundaries in the Microsoft Windows operating systems. Trust boundaries are divisions between privilege levels on a system (e.g., different user accounts or user versus administrator privileges). Discovering paths of data flow between privilege levels allows software auditors to audit only those sections of cod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید