Mandatory access control

Results: 211



#Item
31Towards a formal specification of access control Mathieu Jaume and Charles Morisset SPI – LIP6 – University Paris 6, 8 rue du Capitaine Scott, Paris 75015, France, ,

Towards a formal specification of access control Mathieu Jaume and Charles Morisset SPI – LIP6 – University Paris 6, 8 rue du Capitaine Scott, Paris 75015, France, ,

Add to Reading List

Source URL: focalize.inria.fr

Language: English - Date: 2006-08-29 07:34:00
32Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:38
33CHAPTER  8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
34Hails: Protecting Data Privacy in Untrusted Web Applications Daniel B. Giffin, Amit Levy, Deian Stefan David Terei, David Mazi`eres, John C. Mitchell Stanford  Abstract

Hails: Protecting Data Privacy in Untrusted Web Applications Daniel B. Giffin, Amit Levy, Deian Stefan David Terei, David Mazi`eres, John C. Mitchell Stanford Abstract

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-10-19 15:09:55
35Security Engineering: A Guide to Building Dependable Distributed Systems  PART Two

Security Engineering: A Guide to Building Dependable Distributed Systems PART Two

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
36On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr  University of Minnesota

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
37Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
38CHAPTER  4 Access Control Going all the way back to early time-sharing systems we systems

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
39CHAPTER  9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
40Intrusion detection for resource-constrained embedded control systems in the power grid

Intrusion detection for resource-constrained embedded control systems in the power grid

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04