共 50 条
- [21] Automating Isolation and Least Privilege in Web Services 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 133 - 148
- [22] A study of least privilege in CapBasED-AMS 3RD IFCIS INTERNATIONAL CONFERENCE ON COOPERATIVE INFORMATION SYSTEMS - PROCEEDINGS, 1998, : 208 - 217
- [23] LeMo: Protecting Kernel with Least Privilege Modules PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 349 - 353
- [26] Greedy Algorithm for Least Privilege in RBAC Model COMBINATORIAL OPTIMIZATION AND APPLICATIONS, 2011, 6831 : 537 - 545
- [27] Satisfying Least Privilege through Database Decomposition 20TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN 2024, 2024,
- [28] Mining Least Privilege Roles By Genetic Algorithm FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4508 - 4512
- [29] Are chrome extensions compliant with the spirit of least privilege? International Journal of Information Security, 2022, 21 : 1283 - 1297
- [30] An Authorization Model of Quantitative Analysis of the Least Privilege 2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 283 - 288