Mandatory access control

Results: 211



#Item
81National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
82System software / Malware / Sandbox / Application security / Mandatory Integrity Control / Mandatory access control / Internet security / Windows Vista / Spyware / Computer network security / Computer security / Security

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2013-02-05 23:03:43
83Computer network security / Crime prevention / National security / Data security / Information security / Security controls / Access control / Identity management / Mandatory access control / Security / Computer security / Public safety

DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN DEPTH: USER ACCESS MANAGEMENT DEFENCE IN

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:05
84Crime prevention / Computer security / Computer network security / Information security / Access control / Mandatory access control / Identity management / Password / Network Access Control / Security / Public safety / National security

Microsoft Word - SIFT-UAM-Full-Report - 15 Oct 2008.doc

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:04
85Multilevel security / Bell–LaPadula model / Type enforcement / Access control / Computer file / Computer security / Security / Mandatory access control

Chapter 8 Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-03-31 12:46:41
86Role-based access control / Data security / Role hierarchy / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Information security / QE1 / Security / Computer security / Access control

An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
87Role-based access control / PERMIS / Role hierarchy / Mandatory access control / Mutator method / Discretionary access control / AGDLP / Computer security / Security / Access control

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Language: English - Date: 2008-10-16 13:26:08
88Computer security / Access control / Identity management / Unix / Loadable kernel module / Kernel / STREAMS / Mandatory access control / FreeBSD / Computing / Computer architecture / System software

TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:50:57
89Linux / Operating system-level virtualization / Linux kernel / Hypervisor / Cgroups / Ring / Mandatory access control / Kernel / Hyper-V / System software / Software / LXC

LXCBENCH Understanding the capabilities of Linux Containers in IVI applications through benchmarking Gianpaolo Macario

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-10-16 16:24:47
90Identity management / Authorization / Role-based access control / PERMIS / Group / Mandatory access control / Security / Access control / Computer security

Web App Access Control Design Access Control Best Practices • • •

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:41:45
UPDATE