Discretionary access control

Results: 58



#Item
1

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

Add to Reading List

Source URL: seclab.illinois.edu

Language: English
    2Computing / Software / Computer architecture / Smartphones / Wireless / Android / Mobile operating systems / Near field communication / Google Play / Mobile app / IOS / Mandatory access control

    What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-11-16 12:12:29
    3

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      4

      Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2008-02-07 14:26:30
        5

        Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

        Add to Reading List

        Source URL: fc12.ifca.ai

        Language: English - Date: 2012-02-18 14:33:45
          6Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing

          DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2010-03-04 18:26:58
          7Bell–LaPadula model / Mandatory access control

          DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a file private so only group friends can read it

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2008-03-06 16:24:21
          8Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

          DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2010-03-04 18:26:58
          9Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

          Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

          Add to Reading List

          Source URL: swerl.tudelft.nl

          Language: English - Date: 2008-04-25 16:21:05
          10

          1995 Paper 7 Question 8 Security Explain the difference between discretionary and mandatory access control. [3 marks] Describe the Bell–LaPadula security policy model.

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          - Date: 2014-06-09 10:17:04
            UPDATE