<--- Back to Details
First PageDocument Content
Computer network security / Virtualization / Operating system / Hypervisor / Computer security / Server / Distributed computing / Multilevel security / Active Directory / System software / Computing / Security
Date: 2007-05-23 15:32:15
Computer network security
Virtualization
Operating system
Hypervisor
Computer security
Server
Distributed computing
Multilevel security
Active Directory
System software
Computing
Security

Trusted Passages: Managing Distributed Trust Needs of Emerging Applications Mustaque Ahamad, Martim Carbone, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne, Karsten Schwan and Ramesh Viswanath School of Computer S

Add to Reading List

Source URL: www.ioc.ornl.gov

Download Document from Source Website

File Size: 103,06 KB

Share Document on Facebook

Similar Documents

Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

DocID: 1qCHd - View Document

Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

DocID: 1qe75 - View Document

Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

DocID: 1pV0t - View Document

National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

DocID: 1pekr - View Document

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

DocID: 1lfak - View Document