共 50 条
- [2] TOWARDS WORKING SET BASED APPROXIMATION OF LEAST PRIVILEGE PRINCIPLE FOR OPERATING SYSTEMS IDIMT-2012: ICT SUPPORT FOR COMPLEX SYSTEMS, 2012, 38 : 101 - 108
- [3] Enforcing the principle of least privilege with a state-based privilege control model INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120
- [4] Secure automation: Achieving least privilege with SSH, sudo and setuid USENIX Association Proceedings of the Eighteenth Large Installation System Administration Conference, 2004, : 203 - 212
- [5] Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux 19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
- [6] PRACTICAL USE OF GAUSS PRINCIPLE OF LEAST CONSTRAINT JOURNAL OF APPLIED MECHANICS-TRANSACTIONS OF THE ASME, 1976, 43 (03): : 491 - 496
- [7] Automated Enforcement of the Principle of Least Privilege over Data Source Access 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 510 - 517
- [8] CHERI: A Hardware-Software System to Support the Principle of Least Privilege ERCIM NEWS, 2016, (106): : 23 - +
- [9] Secure Architecture for Embedded Systems 2015 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2015,
- [10] PRACTICAL USE OF GAUSS' PRINCIPLE OF LEAST CONSTRAINT. American Society of Mechanical Engineers (Paper), 1976, (76 -APM-P):