A control point for reducing root abuse of file-system privileges. (2010)

by G Wurster, P C Van Oorschot
Venue:In Proceedings of the 17th ACM conference on Computer and communications security,