Mandatory access control

Results: 211



#Item
11Enabling Government and Business Transformation With Mandatory Access Control Security  December 2006

Enabling Government and Business Transformation With Mandatory Access Control Security December 2006

Add to Reading List

Source URL: www.tresys.com

Language: English - Date: 2014-07-23 16:59:18
    12What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-11-16 12:12:29
    13Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu  Abstract

    Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2014-03-25 14:11:54
    14Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      15Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2008-02-07 14:26:30
        16Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

        Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

        Add to Reading List

        Source URL: w2spconf.com

        Language: English - Date: 2012-02-07 16:10:02
        17A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:06
        18A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

        A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:12
        19Mandatory Access Control at the Object Level in the Java Virtual Machine Vivek Haldar Michael Franz University of California Irvine, CA 92697 +

        Mandatory Access Control at the Object Level in the Java Virtual Machine Vivek Haldar Michael Franz University of California Irvine, CA 92697 +

        Add to Reading List

        Source URL: www.vivekhaldar.com

        Language: English - Date: 2005-12-09 20:49:49
          20Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

          Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

          Add to Reading List

          Source URL: www.niap-ccevs.org

          Language: English - Date: 2009-10-08 10:40:04