<--- Back to Details
First PageDocument Content
Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing
Date: 2010-03-04 18:26:58
Computer memory
Bell–LaPadula model
Covert channel
Mandatory access control
Classified information
Htop
CPU cache
Access control
Security clearance
Security
Computer security
Computing

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Download Document from Source Website

File Size: 149,24 KB

Share Document on Facebook

Similar Documents

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it  Università degli Studi

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

DocID: 1unUe - View Document

Mandatory Access Control Sarah Newman  https://prgmr.com/~srn/mac_apparmor.pdf  Pop Quiz!

Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

DocID: 1t0cX - View Document

The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

DocID: 1qsUu - View Document

fig-capsicum-processes.graffle

fig-capsicum-processes.graffle

DocID: 1pYGG - View Document