Control system security

Results: 2384



#Item
171JPJ8;D@E  Security Lessons K_\jf]kZ_\npZ\ek\if]k_\@ek\ie\k

JPJ8;D@E Security Lessons K_\jf]kZ_\npZ\ek\if]k_\@ek\ie\k

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
172Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA,  Stephen Smalley, NAI Labs,  Abstract The protection mechanisms of current mai

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
173Codes of Safe Practices  ! CONTROL ACCESS ZONE (Safety Monitoring System) A Control Access Zone is used for leading edge or fixed edge work where a minimum distance

Codes of Safe Practices ! CONTROL ACCESS ZONE (Safety Monitoring System) A Control Access Zone is used for leading edge or fixed edge work where a minimum distance

Add to Reading List

Source URL: domesticproduction.com

Language: English - Date: 2013-04-17 19:27:07
174FP7-SECProjectCyber-security on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D4.2 - Automatic Reaction Strategies and RTU

FP7-SECProjectCyber-security on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D4.2 - Automatic Reaction Strategies and RTU

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2015-04-04 09:28:29
175TECHNICAL STUDIES  Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

TECHNICAL STUDIES Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

Add to Reading List

Source URL: www.clusif.fr

Language: English - Date: 2014-09-16 09:37:13
176DAC vs. MAC  Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
177KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

Add to Reading List

Source URL: ieee-security.org

- Date: 2014-04-21 13:48:10
    178THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY  COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

    THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

    Add to Reading List

    Source URL: www.cis.famu.edu

    Language: English - Date: 2009-01-14 09:27:09
      179Account Pro Version 9.1  Help on Installation Operating System MS Vista User Account Control (UAC) in Windows Vista? Windows Vista has the built-in ability to automatically reduce the potential of security breeches in

      Account Pro Version 9.1 Help on Installation Operating System MS Vista User Account Control (UAC) in Windows Vista? Windows Vista has the built-in ability to automatically reduce the potential of security breeches in

      Add to Reading List

      Source URL: www.accsoft.ch

      Language: English - Date: 2008-01-31 11:23:54
        1802013 IEEE Security and Privacy Workshops  How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

        2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2013-05-05 16:04:42