Back to Results
First PageMeta Content
National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software


The Case for Abstracting Security Policies   
Add to Reading List

Open Document

File Size: 95,27 KB

Share Result on Facebook

City

Cambridge / Paris / /

Company

AT&T / MIT Press / Red Hat Inc. / University of Cambridge Computer Laboratory / Intel / Network Appliance Inc. / /

Country

United Kingdom / /

Currency

USD / /

Facility

Communication Engineering Intel Research Cambridge William Gates Building / R. Hall / Richard Sharp University of Cambridge Computer Laboratory / University of Michigan / /

IndustryTerm

trust applications / software development process / Capability systems / automatic security auditing / static analysis tools / implemented systems / purpose operating systems / multi-stakeholder distributed systems / Web Conference Proceedings / software translation techniques / intrusion detection systems / build infrastructure / potential solution / Internet connectivity / Web Security / longer trust applications / printing output / digital signature technology / /

OperatingSystem

Unix / FreeBSD / Unix system / Linux / OpenBSD / /

Organization

Pentagon / Center for Information Technology Integration / MIT / University of Michigan / Schiff Foundation / /

Person

Alastair Beresford / Andrew Moore / Steven Hand / Ian Pratt / Anil Madhavapeddy / Tim Deegan / Alan Mycroft / Ping Buffer / Derek Mcauley / Tim Harris / David Scott / /

/

Position

contractor / plumber / disk scheduler / Head / Dean / system scheduler / /

Product

Security Policy / /

ProgrammingLanguage

C / /

ProvinceOrState

Michigan / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Public Key Infrastructure / DNS / Linux / Unix / Information Technology / PKI / digital signature technology / Unix system / operating system / operating systems / /

SocialTag