Back to Results
First PageMeta Content
Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software


SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu
Add to Reading List

Document Date: 2005-08-24 18:01:33


Open Document

File Size: 209,16 KB

Share Result on Facebook

Company

IBM / Set / SELinux / Get / Windows NT Windows NT / Secure Computing Corporation / Cisco / /

/

Facility

Use port / /

IndustryTerm

security server / on multiple processor / software bugs / security policy systems / process / file systems / add_name remove_name reparent search / process accounting / data applications / /

MusicGroup

Set / /

NaturalFeature

Unix stream / /

OperatingSystem

UNIX / FreeBSD / Fork / Solaris / Linux / IRIX / Microsoft Windows / Windows NT / AIX / /

Organization

National Security Agency / /

Person

Lori Stotler / Brad Spengler / Michael Fox / John Giordano / /

Position

object manager / MAC Model Implementation / bishop / administrator / MAC Model of an operating system security policy / /

Product

Flask / /

ProgrammingLanguage

R / /

Technology

av / UNIX / Linux / API / UNIX operating system / DOM / Operating system / udp / shared memory / operating systems / process control / access control list system / Access Control List / /

SocialTag