Control system security

Results: 2384



#Item
651Inter-process communication / RSBAC / Procfs / Mandatory access control / Kernel / FIFO / Named pipe / System call / System software / Computer architecture / Computer security

The ‘Rule Set Based Access Control’ (RSBAC) Framework for Linux Simone Fischer-Hübner Karlstad University Department of Computer Science SE[removed]Karlstad / Sweden Email: [removed]

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
652Public-key cryptography / Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Transmission Control Protocol / IPsec / Domain Name System Security Extensions / Public key infrastructure / Cryptography / Internet protocols / Internet

1. Introduction A reliable distributed network service requires provisions to prevent accidental or malicious attacks on the servers and clients in the network. Reliability requires that clients can determine that receiv

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2000-05-21 14:04:30
653RSBAC / Linux kernel / Kernel / Grsecurity / Access control list / FIFO / Loadable kernel module / Tar / Architecture of Windows NT / System software / Computer architecture / Software

Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Linux Kongress[removed]One Day Workshop Contents II: 4 Selection of Implemented Models

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
654Prevention / False alarm / Alarm devices / Alarm signal / Fire alarm system / Burglar alarm / Fire alarm control panel / Safety / Security / Alarms

95-60 July 17, 1995 Mr. John Lusardi Police Executive Research Forum 1120 Connecticut Ave., NW, Suite 930 Washington, DC 20037

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2009-05-19 13:27:27
655Net-centric / Military science / System of systems / Systems theory / Computer security / Network-centric warfare / Configuration management / Information technology management / PM Warfighter Information Network-Tactical / Security / Systems engineering / Command and control

Extended Abstract Quantifying the vulnerability of tactical data networks Andy Loebl, James Nutaro, and Teja Kuruganti Oak Ridge National Laboratory {loeblas,nutarojj,kurugantipv}@ornl.gov

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-10 10:52:18
656Access control / RSBAC / Mandatory access control / FIFO / Kernel / Linux kernel / Access control list / Capability-based security / Unix / Computer security / System software / Security

Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Short Overview for OpenWeekend 2002 in Prague Contents II: 3 Implemented Models

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
657Internet protocols / Cross-platform software / Nmap / Computer network security / Gordon Lyon / Transmission Control Protocol / Port / User Datagram Protocol / IP address / Software / Computing / System software

Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Inaugural Webcast; June 26, 2008

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:15:32
658Authorization / Security / PERMIS / Access control

Authorize Enterprise Service Smart organisations now realise that system access must be brought under control in a centralised manner

Add to Reading List

Source URL: www.forge.com.au

Language: English - Date: 2007-01-24 19:12:10
659Fire alarm system / Elevator / Emergency exit / Fire drill / Door / Fire safety / Fire alarm control panel / Burglar alarm / Safety / Security / Prevention

FIRE EXIT PLAN MOUNTAIN SPRINGS – BUILDING D MOUNTAIN SPRINGS MEETING AREA: All occupants meet across Bullock Blvd in the west-side parking lot of the Church of Christ

Add to Reading List

Source URL: www.nmt.edu

Language: English - Date: 2015-02-05 15:50:06
660Internet protocols / HTTP / Two-factor authentication / Authentication / Password / Access token / Basic access authentication / One-time password / Security token / Security / Computer security / Access control

ePass OTP Authentication System White Paper ePass OTP Authentication System White Paper

Add to Reading List

Source URL: www.rs-computer.com

Language: English - Date: 2009-12-15 09:43:31
UPDATE