Control system security

Results: 2384



#Item
671Access control / RSBAC / C++ classes / Role-based access control / Objective-C / Constructor / File system / Mandatory access control / Computing / Object-oriented programming / Software engineering

The Role Compatibility Security Model Paper for the Nordic Workshop on Secure IT Systems (NordSec[removed]Amon Ott Compuniverse Email: [removed], WWW: http://www.rsbac.org October 22, 2002

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
672Federal Reserve System / Database / Access control / Health Insurance Portability and Accountability Act / Information security / Security / Computer security / Internet privacy

The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal government throu

Add to Reading List

Source URL: www.publicdebt.treas.gov

Language: English - Date: 2015-02-25 08:43:31
673Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
674Linux kernel / RSBAC / Linux Security Modules / Access control / Mandatory access control / FLASK / Type enforcement / Grsecurity / PaX / Computer security / System software / Software

RSBAC - a framework for enhanced Linux system security Marek Jawurek∗ RWTH-Aachen Abstract Operating systems traditionally bring their own means of protection against any kind of threats. But often the system’s secur

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
675Crime prevention / National security / Evaluation / Trusted Computer System Evaluation Criteria / Mandatory access control / ITSEC / Common Criteria / CTCPEC / Information security / Computer security / Security / Data security

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00
676Computer security / Identity management / Radio-frequency identification / Operating system / Internet / Technology / Security / Access control

Microsoft Word - PDTN08257.doc

Add to Reading List

Source URL: www.pssmobilety.com

Language: English - Date: 2013-03-13 15:16:12
677Spam filtering / Computer network security / Anti-spam / Internet censorship / Malware / Spyware / Content filtering / Content-control software / Web crawler / Espionage / System software / Computing

White Paper Blue Coat WebFilterTM Technology > Blue Coat WebFilterTM Technology

Add to Reading List

Source URL: blue-coat.ru

Language: English - Date: 2014-03-10 14:41:47
678Computing / System software / Content-control software / Security appliance / Server appliance / SonicWALL / Application firewall / Unified threat management / Spyware / Computer network security / Deep packet inspection / Cyberwarfare

SonicWALL ECLASS Network Security Appliance N E T WO R K SECU R I T Y SonicWALL E-Class NSA for Enterprise-class Deployments

Add to Reading List

Source URL: www.netdominium.pt

Language: English - Date: 2012-12-01 03:18:45
679System software / Norton AntiVirus / EndNote / Symantec / Norton Internet Security / Norton 360 / Norton AntiBot / Export Control Classification Number / Altiris / Software / Antivirus software / Proprietary software

Symantec Corporation Product Classification Matrix BRAND PRODUCT DESCRIPTION

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-08-13 12:30:32
680Internet Information Services / Active Directory / Microsoft Windows / Software / System software

PRESS RELEASE IS Decisions releases UserLock 6.0, the latest version of its unique software solution that provides concurrent login control and tight access security for Microsoft Windows networks. UserLock 6.0 new feat

Add to Reading List

Source URL: download.isdecisions.com

Language: English - Date: 2011-06-15 09:39:42
UPDATE