<--- Back to Details
First PageDocument Content
Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria
Date: 2014-05-07 00:20:20
Trusted computing
Security
Rainbow Series
Multilevel security
Mandatory access control
Evaluation
Trusted system
Discretionary access control
Reference monitor
Computer security
National Security Agency
Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Download Document from Source Website

File Size: 422,56 KB

Share Document on Facebook

Similar Documents

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

DocID: 1unUe - View Document

Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

DocID: 1t0cX - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

DocID: 1qsUu - View Document

Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

DocID: 1pYGG - View Document