... in the C language. Another C program having setuid privilege, jembossctl, is called by the JNI code ...
Tópico(s): Microbial Metabolic Engineering and Bioproduction
2003 - Oxford University Press | Bioinformatics
... job control, and requires neither kernel modifications nor setuid or other permissions even though it runs over ...
Tópico(s): Advanced Malware Detection Techniques
1993 - Wiley | Software Practice and Experience
Jon Pincus, Jeannette M. Wing,
... at small-scale time steps, e.g., using setuid to temporarily grant a process additional access rights; ...
Tópico(s): Information and Cyber Security
2005 - Springer Science+Business Media | Lecture notes in computer science
... processes like login and su from the uncontrolled setuid bit and make them run on behalf of ...
Tópico(s): Advanced Data Storage Technologies
2008 - Association for Computing Machinery | ACM SIGOPS Operating Systems Review
... version 1.1.0 it no longer uses setuid by default. This is feasible because it now ...
Tópico(s): Computability, Logic, AI Algorithms
2024 - EDP Sciences | EPJ Web of Conferences
... security requirements gLExec can be used operating in setuid mode. The two available backends for gLExec - SCAS ...
Tópico(s): Peer-to-Peer Network Technologies
2011 - IOP Publishing | Journal of Physics Conference Series
Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li,
... wholly remove the fingerprints, such as UID and setuid files. In this paper, we propose a new ...
Tópico(s): Network Security and Intrusion Detection
2020 - Springer Science+Business Media | Lecture notes in computer science