-
1
-
-
84910681616
-
-
Last accessed: Aug. 14
-
dijkstra shortest paths. http://www.boost.org/doc/libs/1-55-0/libs/graph/doc/dijkstra-shortest-paths.html. boostC++ libraries. Last accessed: Aug. 14, 2014.
-
(2014)
Dijkstra Shortest Paths
-
-
-
2
-
-
84910635295
-
-
Last accessed: Nov. 12
-
LiCo-The New LinuxCounter Project. http://linuxcounter.net/. Last accessed: Nov. 12, 2013.
-
(2013)
LiCo-The New LinuxCounter Project
-
-
-
4
-
-
84910660402
-
Getresgid, getresuid, setresgid, setresuid-get or set real, effective and saved user or group ID
-
Apr
-
getresgid, getresuid, setresgid, setresuid-get or set real, effective and saved user or group ID. FreeBSD System Calls Manual, Apr. 2001.
-
(2001)
FreeBSD System Calls Manual
-
-
-
5
-
-
84910684897
-
Setresuid, setresgid-set real, effective and saved user or group ID
-
July
-
setresuid, setresgid-set real, effective and saved user or group ID. Linux Programmer's Manual, July 2007.
-
(2007)
Linux Programmer's Manual
-
-
-
6
-
-
84937905628
-
Capabilities-overview of Linux capabilities
-
Aug
-
Capabilities-overview of Linux capabilities. Linux Programmer's Manual, Aug. 2009.
-
(2009)
Linux Programmer's Manual
-
-
-
7
-
-
84910675853
-
Getresgid, getresuid, setresgid, setresuid-get or set real, effective and saved user or group ID
-
Aug
-
getresgid, getresuid, setresgid, setresuid-get or set real, effective and saved user or group ID. OpenBSD Programmer's Manual, Aug. 2013.
-
(2013)
OpenBSD Programmer's Manual
-
-
-
9
-
-
0242697705
-
How to write a setuid program
-
1), Jan
-
M. Bishop. How to write a setuid program. USENIX ;login:, 12(1), Jan. 1987.
-
(1987)
USENIX ;Login
, vol.12
-
-
Bishop, M.1
-
14
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
16
-
-
84900447593
-
Practical techniques to obviate setuid-to-root binaries
-
New York, NY, USA, ACM
-
B. Jain, C.-C. Tsai, J. John, and D. E. Porter. Practical Techniques to Obviate Setuid-to-root Binaries. In Proceedings of the Ninth European Conference on Computer Systems, EuroSys'14, pages 8:1-8:14, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the Ninth European Conference on Computer Systems, EuroSys'14
, pp. 81-814
-
-
Jain, B.1
Tsai, C.-C.2
John, J.3
Porter, D.E.4
-
21
-
-
70449688944
-
The murky issue of changing process identity: Revising "setuid demystified"
-
June
-
D. Tsafrir, D. D. Silva, and D. Wagner. The Murky Issue of Changing Process Identity: Revising "Setuid Demystified". USENIX ;login:, 33(3), June 2008.
-
(2008)
USENIX ;Login
, vol.33
, pp. 3
-
-
Tsafrir, D.1
Silva, D.D.2
Wagner, D.3
|