Mandatory access control

Results: 211



#Item
41Paper Title (use style: paper title)

Paper Title (use style: paper title)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-07 14:08:57
42On the Unification of Access Control and Data Services David Ferraiolo1, Serban Gavrila1, Wayne Jansen2 1 National Institute of Standards and Technology

On the Unification of Access Control and Data Services David Ferraiolo1, Serban Gavrila1, Wayne Jansen2 1 National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-28 16:26:44
43SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail:  

SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: 

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:24:30
44Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Sergey Bratus  Sara Sinclair

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Sergey Bratus Sara Sinclair

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:09
45CONFIGURING STORAGE-AREA NETWORKS FOR MANDATORY SECURITY Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart Computer Science Department University College Cork Cork, Ireland

CONFIGURING STORAGE-AREA NETWORKS FOR MANDATORY SECURITY Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart Computer Science Department University College Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:09:49
46Security Enhanced BSD Chris Vance, Robert Watson Network Associates LaboratoriesOmega Drive, Suit 300 Rockville, MD 20850 ,

Security Enhanced BSD Chris Vance, Robert Watson Network Associates LaboratoriesOmega Drive, Suit 300 Rockville, MD 20850 ,

Add to Reading List

Source URL: www.trustedbsd.org

Language: English - Date: 2014-02-25 09:35:55
47Protecting Users From “Themselves” William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Departme

Protecting Users From “Themselves” William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Departme

Add to Reading List

Source URL: www.enck.org

Language: English
48Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
49Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-08-17 14:44:03
50Martin et al. Critical Care 2011, 15:R84 http://ccforum.com/content/15/2/R84 RESEARCH  Open Access

Martin et al. Critical Care 2011, 15:R84 http://ccforum.com/content/15/2/R84 RESEARCH Open Access

Add to Reading List

Source URL: ccforum.com

Language: English