Mandatory access control

Results: 211



#Item
171Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
172Public-key cryptography / Access control / ISO standards / Ubiquitous computing / Smart card / Authentication protocol / Public key infrastructure / Subscriber identity module / Password authentication protocol / Cryptography / Security / Cryptographic protocols

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
173Programming language implementation / VM / Hypervisor / Hyper-V / Operating system / Xen / Type enforcement / Mandatory access control / Embedded hypervisor / System software / Software / Virtual machines

RC23865 (W0602-038) February 2, 2006 Computer Science

Add to Reading List

Source URL: domino.research.ibm.com

Language: English - Date: 2006-02-08 12:03:13
174Security / Bell–LaPadula model / Multilevel security / Information flow / Covert channel / VM / Risk / Mandatory access control / Hyper-V / System software / Computer security / Software

RC24154 (W0701-086) January 18, 2007 Computer Science

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2013-08-20 15:06:04
175Crime prevention / National security / Security-Enhanced Linux / Mandatory access control / Principle of least privilege / Multilevel security / Comparison of privilege authorization features / Type enforcement / Superuser / Computer security / Security / National Security Agency

Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-03-05 16:10:36
176National Security Agency / Security-Enhanced Linux / FLASK / Mandatory access control / Trusted Information Systems / Operating system / Linux / Type enforcement / Security-focused operating system / Computer security / Computing / System software

Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 15:26:04
177Data security / Crime prevention / National security / Role-based access control / Separation of duties / Information security / Role hierarchy / Mandatory access control / PERMIS / Security / Computer security / Access control

Master Thesis Computer Science Thesis no: MCS-2006:16

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2009-06-25 11:14:02
178Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
179Crime prevention / National security / Operating system / Mandatory access control / Password / Kernel / Access Control Matrix / Capability-based security / Ring / Security / Computer security / Access control

Microsoft Word - OS Security Considerations

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-07-05 08:26:00
180National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Fedora / Debian / Linux kernel / Access control / Antivirus software / Computer security / Software / System software

Yuichi Nakamura, Hitachi Software Engineering Co., Ltd. [removed]

Add to Reading List

Source URL: www.celinux.org

Language: English - Date: 2008-06-11 03:00:00
UPDATE