Mandatory access control

Results: 211



#Item
131Operating system / Debian / Cross-domain solution / Hardening / Access control / Ring / Security-Enhanced Linux / FLASK / Computer security / Mandatory access control / Type enforcement

White Paper Levels of Linux Operating System Security Owl Approach to the Hardening of Linux Abstract

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2012-02-15 13:02:55
132Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
133Crime prevention / National security / Information flow / Information theory / Information security / Covert channel / Bell–LaPadula model / Security policy / Mandatory access control / Computer security / Security / Cyberwarfare

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-11-25 05:03:09
134Cross-platform software / AppArmor / Unix / Mandatory access control / Ubuntu / Sandbox / Mmap / Debian / Man page / Software / Computing / System software

Package ‘RAppArmor’ July 2, 2014 Type Package Title Interfaces to Linux and AppArmor security methods. Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:16:11
135Cross-platform software / Sandbox / Mandatory access control / Ring / Operating system / R / Kernel / Debian / Linux / Software / System software / Computing

The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux Jeroen Ooms UCLA Department of Statistics Abstract

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:16:11
136Access control / Mandatory access control / Information security / Security controls / XACML / Role-based access control / Health Insurance Portability and Accountability Act / Security policy / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-11-20 12:11:33
137Software / Secure Shell / OpenSSH / Comparison of SSH clients / Privilege separation / Comparison of SSH servers / Mandatory access control / Access control / Operating system / Cryptographic software / System software / Computer security

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Policy Enforced Remote Login

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2003-03-19 11:14:03
138Central processing unit / Ring / Mandatory access control / Principle of least privilege / System call / Operating system / Kernel / Privilege / Process / Computer security / Computing / System software

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Execution Policies

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2003-03-19 11:11:30
139Crime prevention / National security / Evaluation / XTS-400 / Mandatory access control / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Linux kernel / Computer security / Security / Computing

Microsoft Word - DISTPG.doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-09-28 10:43:57
140Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing

/tardir/tiffs/a408429.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 15:52:20
UPDATE