Back to Results
First PageMeta Content
Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security


Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger
Add to Reading List

Document Date: 2006-02-09 00:36:18


Open Document

File Size: 618,03 KB

Share Result on Facebook

Company

IBM / Wilson / CW-Lite-Compliant Systems / Intel / /

/

Facility

University of California at Berkeley / /

IndustryTerm

end systems / security policy analysis tool / real systems using tools / concrete solution / policy analysis tool / software tools / target applications / /

OperatingSystem

UNIX / Linux / Fedora / /

Organization

University of California / Pennsylvania State University / /

Person

Frank Mayer / Fedora Core / Shankar Trent Jaeger Reiner Sailer / /

Position

System Administrator / administrator / application programmer / SELinux policy model / programmer / /

Product

SELinux kernel module / OpenSSH 3.6 / Gokyo tool / SELinux / OpenSSH / Gokyo / /

ProvinceOrState

California / /

Technology

cron script / UNIX / Linux / HTTP / shared memory / operating systems / /

SocialTag