Mandatory access control

Results: 211



#Item
91A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-01-07 00:22:22
92Secure and Simple Sandboxing in SELinux James Morris [removed]  FOSS.my 2009

Secure and Simple Sandboxing in SELinux James Morris [removed] FOSS.my 2009

Add to Reading List

Source URL: selinuxproject.org

Language: English - Date: 2009-10-24 03:19:35
93Leveraging IPsec for Distributed Authorization Trent Jaeger∗ David King∗ Kevin Butler∗ Jonathan McCune◦ Ram´on C´aceres† Serge Hallyn‡ Joy Latten‡ Reiner Sailer† Xiolan Zhang† ∗  Department of Compu

Leveraging IPsec for Distributed Authorization Trent Jaeger∗ David King∗ Kevin Butler∗ Jonathan McCune◦ Ram´on C´aceres† Serge Hallyn‡ Joy Latten‡ Reiner Sailer† Xiolan Zhang† ∗ Department of Compu

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2014-03-17 18:02:35
94Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2014-09-26 16:58:51
95Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:42
96The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
97Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.incose-cc.org

Language: English - Date: 2013-08-29 11:50:21
98A Guide to Understanding Security Modeling in Trusted Systems

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 00:20:20
99Security Administration Guide

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19