Mandatory access control

Results: 211



#Item
101A Taxonomy of Organisational Security Policies Dr. Gary W. Smith and Richard B. Newton Science Applications International Corporation McLean, VA Abstract: although the Common Criteria provides an exhaustive list of secur

A Taxonomy of Organisational Security Policies Dr. Gary W. Smith and Richard B. Newton Science Applications International Corporation McLean, VA Abstract: although the Common Criteria provides an exhaustive list of secur

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
102Policy-Enhanced Linux An Educational Tool Paul C. Clark [removed]  Overview

Policy-Enhanced Linux An Educational Tool Paul C. Clark [removed] Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
103Microsoft Word - MYSEA-MILCOM10-Final.docx

Microsoft Word - MYSEA-MILCOM10-Final.docx

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:52:58
104Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:37:28
105Detecting Hidden Logic Bombs in Critical Infrastructure Software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-03-26 14:41:48
106Engineering Secure Systems  Lessons Learned from Building a High-Assurance Crypto Gateway  The construction of a complex secure system composed

Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:53:03
107MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-03-24 14:46:06
108An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed]  Abstract

An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed] Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
109Implementation of Multiple Access Control Policies within a CORBASEC framework Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Implementation of Multiple Access Control Policies within a CORBASEC framework Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
110The OM-AM Framework and Role-Based Access Control Prof. Ravi Sandhu George Mason University www.list.gmu.edu

The OM-AM Framework and Role-Based Access Control Prof. Ravi Sandhu George Mason University www.list.gmu.edu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00