نتایج جستجو برای: privilege
تعداد نتایج: 6645 فیلتر نتایج به سال:
Feminist theorists have made valuable efforts to open up new lines of inquiry into the disadvantage suffered by women in philosophy virtue their sex, race, class, dis/ability, and other markers social identity. Within this scholarship there is growing recognition that issue requires modes intervention go deeper than commitments equal opportunity diversity training. This has intensified light mo...
Despite significant effort in improving software quality, vulnerabilities and bugs persist in applications. Attackers remotely exploit vulnerabilities in network-facing applications and then disclose and corrupt users’ sensitive information that these applications process. Reducing privilege of application components helps to limit the harm that an attacker may cause if she exploits an applicat...
This paper proposes a novel approach to help computing system administrators in monitoring the security of their systems. This approach is based on modeling the system as a privilege graph exhibiting operational security vulnerabilities and on transforming this privilege graph into a Markov chain corresponding to all possible successful attack scenarios. A set of tools has been developed to gen...
Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-based Usage Control (TUCON). TUCON extends traditional and temporal access control models with times-based usage control by defining the maximum times that a privilege can be exercised. When the usage times of a privilege is consume...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید