<--- Back to Details
First PageDocument Content
National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention
Date: 2010-09-02 21:29:55
National security
Evaluation
Access control
Trusted Computer System Evaluation Criteria
Common Criteria
Information security
Discretionary access control
Protection Profile
Trusted computing base
Computer security
Security
Crime prevention

CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

Add to Reading List

Source URL: www.commoncriteriaportal.org

Download Document from Source Website

File Size: 369,45 KB

Share Document on Facebook

Similar Documents

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

DocID: 1o7ui - View Document

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

DocID: 1mMDu - View Document

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

DocID: 1mquH - View Document

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

DocID: 1mkXj - View Document

Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

DocID: 1l7f0 - View Document