BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (3)
inform (3)
code (2)
architectur (2)
kernel (2)

Stem privileg$ (all stems)

15 papers:

ESOPESOP-2015-CalzavaraBCS #detection #fine-grained
Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ASPLOSASPLOS-2015-DautenhahnKDCA #architecture #kernel #operating system
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation (ND, TK, WD, JC, VSA), pp. 191–206.
ICPRICPR-2014-MarcaciniDHR #approach #clustering #documentation #learning #metric
Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
SIGIRSIGIR-2014-VinjumurOP #reliability #reuse
Assessing the reliability and reusability of an E-discovery privilege test collection (JKV, DWO, JHP), pp. 1047–1050.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
DocEngDocEng-2013-MarcaciniR #clustering #incremental
Incremental hierarchical text clustering with privileged information (RMM, SOR), pp. 231–232.
ICPRICPR-2012-JiSL #multi
Multitask multiclass privileged information support vector machines (YJ, SS, YL), pp. 2323–2326.
OSDIOSDI-2012-BelayBMTMK #cpu #named
Dune: Safe User-level Access to Privileged CPU Features (AB, AB, AJM, DT, DM, CK), pp. 335–348.
ICSTICST-2012-SprenkleCP #classification #modelling #statistics #web
Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
ECSAECSA-2010-ScandariatoBJ #architecture #automation #detection
Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
WCREWCRE-1999-LetarteM99a #interprocedural #modelling #php
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code (DL, EM), pp. 187–191.
ECOOPECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
ICEISICEIS-v3-2004-YongzhengX #taxonomy
A New Vulnerability Taxonomy Based on Privilege Escalation (YZ, XcY), pp. 596–600.
ICALPICALP-2003-GorlaP #resource management
Resource Access and Mobility Control with Dynamic Privileges Acquisition (DG, RP), pp. 119–132.
ICSEICSE-1985-MinskyL
Ensuring Integrity by Adding Obligations to Privileges (NHM, AL), pp. 92–102.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.