Mandatory access control

Results: 211



#Item
61An Information Flow Control Model for the Cloud Thomas F. J.-M. Pasquier, Jatinder Singh and Jean Bacon Olivier Hermant  Computer Laboratory, University of Cambridge

An Information Flow Control Model for the Cloud Thomas F. J.-M. Pasquier, Jatinder Singh and Jean Bacon Olivier Hermant Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-02-19 09:07:45
62Oracle Label Security Administrator’s Guide

Oracle Label Security Administrator’s Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-05 02:07:00
63Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
64INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Description of models for the

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Description of models for the

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-09-16 06:00:41
65International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
66IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-01-07 13:58:19
67The ‘Rule Set Based Access Control’ (RSBAC) Framework for Linux Simone Fischer-Hübner Karlstad University Department of Computer Science SE[removed]Karlstad / Sweden Email: [removed]

The ‘Rule Set Based Access Control’ (RSBAC) Framework for Linux Simone Fischer-Hübner Karlstad University Department of Computer Science SE[removed]Karlstad / Sweden Email: [removed]

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
68COVER STORY  RSBAC Architecture of Rule Set Based Access Control (RSBAC)

COVER STORY RSBAC Architecture of Rule Set Based Access Control (RSBAC)

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
69Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Short Overview for OpenWeekend 2002 in Prague Contents II: 3 Implemented Models

Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Short Overview for OpenWeekend 2002 in Prague Contents II: 3 Implemented Models

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
703 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

3 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02