Discretionary access control

Results: 58



#Item
21Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:20
22Multilevel security / Bell–LaPadula model / Type enforcement / Access control / Computer file / Computer security / Security / Mandatory access control

Chapter 8 Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-03-31 12:46:41
23Role-based access control / Data security / Role hierarchy / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Information security / QE1 / Security / Computer security / Access control

An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
24Role-based access control / PERMIS / Role hierarchy / Mandatory access control / Mutator method / Discretionary access control / AGDLP / Computer security / Security / Access control

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Language: English - Date: 2008-10-16 13:26:08
25Role-based access control / XACML / Discretionary access control / PERMIS / Information security / Authorization / Security management / Capability-based security / Federal Information Security Management Act / Security / Computer security / Access control

NIST 7316, Assessment of Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-15 09:51:53
26Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 00:20:20
27Role-based access control / NIST RBAC model / PERMIS / Role hierarchy / Discretionary access control / Principle of least privilege / Filesystem permissions / Delegation in IT / AGDLP / Computer security / Security / Access control

A role-based access control model and reference implementation within a corporate intranet

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:22:16
28Role-based access control / PERMIS / Mandatory access control / Discretionary access control / NIST RBAC model / Computer security / Security / Access control

The OM-AM Framework and Role-Based Access Control Prof. Ravi Sandhu George Mason University www.list.gmu.edu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
29Access control / Trusted Computer System Evaluation Criteria / Operating system / Loadable kernel module / Bell–LaPadula model / Kernel / File system / Discretionary access control / Biba Model / Computer security / National Security Agency / Mandatory access control

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
30Unified Modeling Language / Diagrams / Knowledge representation / Mandatory access control / Principle of least privilege / Bell–LaPadula model / Discretionary access control / Capability-based security / Profile / Computer security / Security / Access control

Towards the Formal Modeling of a Secure Operating System Dan Zhou Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE