<--- Back to Details
First PageDocument Content
XTS-400 / Mandatory access control / Common Criteria / Mandatory Integrity Control / Access control / Evaluation Assurance Level / Discretionary access control / Bell–LaPadula model / Biba Model / Computer security / Security / Evaluation
Date: 2011-04-10 16:37:02
XTS-400
Mandatory access control
Common Criteria
Mandatory Integrity Control
Access control
Evaluation Assurance Level
Discretionary access control
Bell–LaPadula model
Biba Model
Computer security
Security
Evaluation

National Information Assurance Partnership ®

Add to Reading List

Source URL: www.commoncriteriaportal.org

Download Document from Source Website

File Size: 215,11 KB

Share Document on Facebook

Similar Documents

Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

DocID: 1gvRy - View Document

Bell–LaPadula model / Mandatory access control

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a file private so only group friends can read it

DocID: 1g2nO - View Document

Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DocID: 1fuvr - View Document

1995 Paper 7 Question 8 Security Explain the difference between discretionary and mandatory access control. [3 marks] Describe the Bell–LaPadula security policy model.

DocID: 1daR3 - View Document

Bell–LaPadula model / Organisation-based access control / Mandatory access control / Structure / Secure state / Cyberwarfare / Security / Metalogic / Model theory

Towards a formal specification of access control Mathieu Jaume and Charles Morisset SPI – LIP6 – University Paris 6, 8 rue du Capitaine Scott, Paris 75015, France, ,

DocID: 1avtz - View Document