Bell–LaPadula model

Results: 41



#Item
11Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART Two

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
12Access control / Secure state / Trusted system / Multilevel security / Security / Computer security / Bell–LaPadula model

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:26
13Medical informatics / Privacy / Health informatics / International standards / Medical terms / Bell–LaPadula model / Medical privacy / Information privacy / Electronic health record / Medicine / Health / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 8 Multilateral Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:54:48
14Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
15Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
16Crime prevention / National security / Information flow / Information theory / Computer network security / Information security / Covert channel / Bell–LaPadula model / Mandatory access control / Security / Computer security / Public safety

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-01-07 13:58:19
17Multilevel security / Bell–LaPadula model / Type enforcement / Access control / Computer file / Computer security / Security / Mandatory access control

Chapter 8 Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-03-31 12:46:41
18Access control / Trusted Computer System Evaluation Criteria / Operating system / Loadable kernel module / Bell–LaPadula model / Kernel / File system / Discretionary access control / Biba Model / Computer security / National Security Agency / Mandatory access control

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
19Unified Modeling Language / Diagrams / Knowledge representation / Mandatory access control / Principle of least privilege / Bell–LaPadula model / Discretionary access control / Capability-based security / Profile / Computer security / Security / Access control

Towards the Formal Modeling of a Secure Operating System Dan Zhou Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
20Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
UPDATE