LOMAC

Results: 5



#Item
1DAC vs. MAC  Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
2PlusD D Public Library of US Dipl Diplomacy lomac

PlusD D Public Library of US Dipl Diplomacy lomac

Add to Reading List

Source URL: www.wikileaks.org

Language: English - Date: 2013-04-04 20:41:44
    3Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2006-02-09 00:36:18
    4USENIX Association  Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference

    USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference

    Add to Reading List

    Source URL: alum.wpi.edu

    Language: English - Date: 2004-08-23 17:55:18
    5

    PDF Document

    Add to Reading List

    Source URL: alum.wpi.edu

    Language: English - Date: 2004-08-23 17:54:47