The ultimate goal of any access control system is to assign precisely the necessary level of access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …
S Ouchani, A Khaled - 2019 IEEE/ACS 16th International …, 2019 - ieeexplore.ieee.org
One of the main challenges in the development process of secure systems is how to detect as early as possible the system's vulnerabilities and weaknesses, and also how to quantify …
K Huang, L Yang, R Fu, S Zhou… - China …, 2019 - ieeexplore.ieee.org
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or …
Operating systems such as Linux break the power of the root user into separate privileges (which Linux calls capabilities) and give processes the ability to enable privileges only when …