Mandatory access control

Results: 211



#Item
81The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
82State of the Art of Application Restrictions and Sandboxes

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2013-02-05 23:03:43
83Computer network security / Crime prevention / National security / Data security / Information security / Security controls / Access control / Identity management / Mandatory access control / Security / Computer security / Public safety

DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:05
84Microsoft Word - SIFT-UAM-Full-Report - 15 Oct 2008.doc

Microsoft Word - SIFT-UAM-Full-Report - 15 Oct 2008.doc

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:04
85Chapter 8  Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Chapter 8 Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-03-31 12:46:41
86An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
87Microsoft Word - SampleChapter.doc

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Language: English - Date: 2008-10-16 13:26:08
88TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:50:57
89LXCBENCH Understanding the capabilities of Linux Containers in IVI applications through benchmarking Gianpaolo Macario

LXCBENCH Understanding the capabilities of Linux Containers in IVI applications through benchmarking Gianpaolo Macario

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-10-16 16:24:47
90Web App Access Control Design  Access Control Best Practices • • •

Web App Access Control Design Access Control Best Practices • • •

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:41:45