نتایج جستجو برای: privilege
تعداد نتایج: 6645 فیلتر نتایج به سال:
We present a new approach for separating configuration privilege from traditional root privilege. We limit this new configuration privilege to a single (new) system daemon, configd. This daemon reads requests for changes in system configuration, either allowing or denying each request based on various criteria (possibly including user input). We do not allow any other application to run with co...
In the recent years the types of malware and level of their sophistication has increased dramatically [1]. In 2007, the number of computer viruses increased by 1 million and most of them were new attacks [2]. Unknown code downloaded and executed from the Internet can cause unrecoverable damage to the Operating System via privilege-escalation attacks. Malicious code can be unintentionally and tr...
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are relegated to the monitor, which results in a smaller and more secure trust base. Previously the privilege separation procedure, i.e., partitioning one program into the monitor and slave, was done by hand [17,26]. We d...
In theory, environmental audit-privilege laws grant immunity to companies that uncover environmental problems during self-audits and that take steps to correct them so that information gleaned from such audits cannot be used against the company in a lawsuit. Supporters of audit-privilege laws believe these laws encourage more audits and more disclosures of regulatory violations because of the g...
The eye, like the brain and reproductive organs, possesses inherent immune privilege, and inflammation is self-regulated so as to preserve the organ functions. Studies over the past 30 years have provided insights of the multiple mechanisms of immune privilege. At present, three major lines of thought prevail regarding the molecular mechanisms of immune privilege in the eye: there are (1) anato...
leave : provided that, if on the first occasion on which he takes leave after January 1st, 1919, he combines with other leave privilege leave to a less amount than stands to his credit, the balance of the privilege leave at his credit will lapse, and he will not be entitled to enjoy it on a subsequent occasion. The total amount of privilege leave to be enjoyed under this clause on the second oc...
Our article aims at refocusing the debate in privilege studies from tackling invisibility to challenging justifications of gender privilege. Focusing on instances which men acknowledge that they receive preferential treatment, this study sheds light how is perceived and talked about interviews with female-dominated occupations. In contrast existing literature privileged, our analysis shows priv...
MOTIVATION Certain chemical substructures are present in many drugs. This has led to the claim of 'privileged' substructures which are predisposed to bioactivity. Because bias in screening library construction could explain this phenomenon, the existence of privilege has been controversial. RESULTS Using diverse phenotypic assays, we defined bioactivity for multiple compound libraries. Many s...
A new low-complexity approach to intrusion detection called "bottleneck verification" was developed which can find novel attacks with low false alarm rates. Bottleneck verification is a general approach to intrusion detection designed specifically for systems where there are only a few legal "bottleneck" methods to transition to a higher privilege level and where it is relatively easy to determ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید