Bell–LaPadula model

Results: 41



#Item
31Security / Bell–LaPadula model / Multilevel security / Information flow / Covert channel / VM / Risk / Mandatory access control / Hyper-V / System software / Computer security / Software

RC24154 (W0701-086) January 18, 2007 Computer Science

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2013-08-20 15:06:04
32Virtual machines / Hypervisor / Bell–LaPadula model / Hyper-V / VM / Xen / Biba Model / Trusted Computer System Evaluation Criteria / Covert channel / System software / Computing / Software

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
33XTS-400 / Mandatory access control / Common Criteria / Mandatory Integrity Control / Access control / Evaluation Assurance Level / Discretionary access control / Bell–LaPadula model / Biba Model / Computer security / Security / Evaluation

National Information Assurance Partnership ®

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-04-10 16:37:02
34Secure communication / Trusted computing / National security / Trusted system / Multics / Bell–LaPadula model / Trusted Computer System Evaluation Criteria / Operating system / Secure state / Computer security / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2005-11-21 16:32:53
35Medical informatics / Privacy / Health informatics / International standards / Medical terms / Bell–LaPadula model / Medical privacy / Information privacy / Electronic health record / Medicine / Health / Computer security

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:54:48
36National Security Agency / National security / Bell–LaPadula model / Mandatory access control / Discretionary access control / Trusted Computer System Evaluation Criteria / Trusted system / Access Control Matrix / Capability-based security / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1999-04-01 11:22:57
37Crime prevention / National security / Computer network security / Clark–Wilson model / Information security / Biba Model / Security policy / Data integrity / Bell–LaPadula model / Computer security / Security / Public safety

PDF Document

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:30
38Crime prevention / National security / Computer network security / Clark–Wilson model / Information security / Biba Model / Security policy / Data integrity / Bell–LaPadula model / Computer security / Security / Public safety

PDF Document

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-04-18 12:21:08
39National security / Defence Research and Development Canada / Department of National Defence / National Security Agency / Multilevel security / Mandatory access control / Trusted Computer System Evaluation Criteria / Bell–LaPadula model / Information security / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: pubs.drdc.gc.ca

Language: English
40Computer security / Bell–LaPadula model / Secure state

PDF Document

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 1999-04-22 11:03:24
UPDATE