ThesaHelp: ACM references f-l
Topic: limitations of system security
Group: security
Topic: security by access rights
Topic: security by capabilities
Topic: authentication
| |
Reference
Karp, A.H.,
"Enforce POLA on processes to control viruses",
Communications of the ACM, 46, 12, pp. 27-29, December 2003.
Google
Quotations
27 ;;Quote: limit damage instead of preventing security attacks
| 27+;;Quote: limit damage via the principle of least authority; at the process or object level
| 27+;;Quote: a user's actions implicitly specifies the desired permissions for processes and objects
| 28 ;;Quote: separate authentication, authorization, and access control; authentication provides a set of authorizations for access control
|
Related Topics
ThesaHelp: ACM references f-l (241 items)
Topic: limitations of system security (32 items)
Group: security (23 topics, 802 quotes)
Topic: security by access rights (36 items)
Topic: security by capabilities (65 items)
Topic: authentication (87 items)
|