Mandatory access control

Results: 211



#Item
151Trusted Computer System Evaluation Criteria / Common Criteria / Kernel / Evaluation Assurance Level / Ring / Shared resource / XTS-400 / Mandatory access control / Computer security / Evaluation / Multilevel security

High Assurance MLS File Service

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
152XACML / Computer network security / Vulnerability / Social vulnerability / Role-based access control / Authorization / Mandatory access control / Grant / Business rules engine / Security / Computer security / Access control

Vulnerability Hierarchies in Access Control Configurations D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD[removed]removed] Abstract— This paper applies methods for analyzing fault hi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-14 10:10:42
153Role-based access control / Database management system / Mandatory access control / AGDLP / Security / Access control / Computer security

Business Process Driven Framework for defining an Access Control Service based on Roles and Rules Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
154National Security Agency / Trusted computing / Trusted computing base / Trusted Computer System Evaluation Criteria / Operating system / Mandatory access control / Kernel / Ring / Device driver / Computer security / Computer architecture / Computing

The Army Secure Operating System Neil A. Waldhart TRW Systems Integration Group

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:40:38
155National Security Agency / Trusted Computer System Evaluation Criteria / Secure communication / United States Department of Defense / Mandatory access control / Defense Technical Information Center / Trusted computing base / Penetration test / XTS-400 / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-14 21:01:17
156Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Trusted system / Information security / Classified information / Security policy / Computer security / Security / National security

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
157Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
158Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
159Business law / Copyright law / Security / Trusted Platform Module / Trustworthy computing / Trusted Execution Technology / Security-Enhanced Linux / Mandatory access control / Type enforcement / Computer security / Trusted computing / Cryptography

The 9th International Conference for Young Computer Scientists Model–Driven Remote Attestation: Attesting Remote System from Behavioral Aspect Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Yanzhen Zou1 , Bing Xie1 , W

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:16:45
160Computing / Cloud clients / Android / Embedded Linux / Smartphones / Role-based access control / Identity management / Mandatory Integrity Control / XACML / Computer security / Security / Access control

Context-Aware Usage Control for Android Guangdong Bai, Liang Gu, Tao Feng, Yao Guo ⋆ , and Xiangqun Chen Key Laboratory of High Confidence Software Technologies (Ministry of Education), Institute of Software, School of

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:02:10
UPDATE