Mandatory access control

Results: 211



#Item
161Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:05:05
162USENIX Association  Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference

USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference

Add to Reading List

Source URL: alum.wpi.edu

Language: English - Date: 2004-08-23 17:55:18
163The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 Robert Watson Network Associates Laboratories Rockville, MD

The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 Robert Watson Network Associates Laboratories Rockville, MD

Add to Reading List

Source URL: www.trustedbsd.org

Language: English - Date: 2014-02-25 09:35:54
164Security Enhancements (SE) for Android Stephen Smalley Trusted Systems Research National Security Agency  CLASSIFICATION HEADER

Security Enhancements (SE) for Android Stephen Smalley Trusted Systems Research National Security Agency CLASSIFICATION HEADER

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-04-23 14:58:00
165Laying a Secure Foundation for Mobile Devices Stephen Smalley

Laying a Secure Foundation for Mobile Devices Stephen Smalley

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-25 23:08:31
166Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2 1

Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2 1

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:04
167Essay 9  Rule-Set Modeling

Essay 9 Rule-Set Modeling

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2006-02-01 10:24:16
168The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments

The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-01-14 18:20:50
169SYMANTEC ADVANCED THREAT RESEARCH  1

SYMANTEC ADVANCED THREAT RESEARCH 1

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2006-08-06 15:21:32
170Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, [removed]

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-12-29 17:06:34