Mandatory Integrity Control

Results: 28



#Item
1Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
2Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
3Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
4Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-08-01 20:48:11
5Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-04-29 08:46:04
6Embedded Linux / Smartphones / Information flow / Information theory / Android / Label / Mandatory Integrity Control / Declassification / Java / Computing / Software / Information

Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
7Smartphones / Android / Mandatory Integrity Control / Java / Computing / Software / Embedded Linux

Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
8Embedded Linux / Smartphones / Information flow / Information theory / Android / Label / Mandatory Integrity Control / Declassification / Java / Computing / Software / Information

Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-07-16 21:28:14
9Smartphones / Android / Mandatory Integrity Control / Java / Computing / Software / Embedded Linux

Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-06-10 12:47:45
10Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
UPDATE