DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1
hits: 4
1.
Full text
Available for: UL
2.
  • RootAsRole: a security modu... RootAsRole: a security module to manage the administrative privileges for Linux
    Wazan, Ahmad Samer; Billoir, Eddie; Chadwick, David W. ... Computers & security, 2023
    Journal Article
    Peer reviewed
    Open access

    Today, Linux users use sudo/su commands to attribute Linux’s administrative privileges to their programs. These commands always give the whole list of administrative privileges to Linux programs ...
Full text
Available for: UL
3.
  • On the Validation of Web X.... On the Validation of Web X.509 Certificates by TLS Interception Products
    Wazan, Ahmad Samer; Laborde, Romain; Chadwick, David W. ... IEEE transactions on dependable and secure computing, 2022-Jan.-Feb.-1, 2022-1-1, 20220101, 2022-01-01, Volume: 19, Issue: 1
    Journal Article
    Open access

    The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web Browsers exhibit ...
Full text
Available for: UL

PDF
4.
  • Implementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives
    Billoir, Eddie; Laborde, Romain; Wazan, Ahmad Samer ... 2023 7th Cyber Security in Networking Conference (CSNet), 2023-Oct.-16
    Conference Proceeding
    Open access

    Historically and by default, Linux does not respect the principle of least privilege because it grants all the privileges to administrators to execute their tasks. With the new personal data ...
Full text
Available for: UL

Load filters