Mandatory access control

Results: 211



#Item
171Security Engineering: A Guide to Building Dependable Distributed Systems  PART

Security Engineering: A Guide to Building Dependable Distributed Systems PART

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
172LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
173RC23865 (W0602-038) February 2, 2006 Computer Science

RC23865 (W0602-038) February 2, 2006 Computer Science

Add to Reading List

Source URL: domino.research.ibm.com

Language: English - Date: 2006-02-08 12:03:13
174RC24154 (W0701-086) January 18, 2007 Computer Science

RC24154 (W0701-086) January 18, 2007 Computer Science

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2013-08-20 15:06:04
175Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco

Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-03-05 16:10:36
176Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 15:26:04
177Master Thesis Computer Science Thesis no: MCS-2006:16

Master Thesis Computer Science Thesis no: MCS-2006:16

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2009-06-25 11:14:02
178FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
179Microsoft Word - OS Security Considerations

Microsoft Word - OS Security Considerations

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-07-05 08:26:00
180Yuichi Nakamura, Hitachi Software Engineering Co., Ltd. [removed]

Yuichi Nakamura, Hitachi Software Engineering Co., Ltd. [removed]

Add to Reading List

Source URL: www.celinux.org

Language: English - Date: 2008-06-11 03:00:00