Mandatory access control

Results: 211



#Item
1

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

Add to Reading List

Source URL: tinytocs.ece.utexas.edu

Language: English - Date: 2016-03-05 17:06:25
    2

    Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

    Add to Reading List

    Source URL: www.svlug.org

    - Date: 2016-11-03 13:38:18
      3Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

      The Case for Abstracting Security Policies   

      Add to Reading List

      Source URL: rich.recoil.org

      Language: English - Date: 2006-04-13 14:58:02
      4Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

      High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:31
      5Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

      fig-capsicum-processes.graffle

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-03-09 05:43:31
      6National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

      Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

      Add to Reading List

      Source URL: www.inguardians.com

      Language: English - Date: 2016-08-05 14:35:56
      7Computer access control / Access control / Access control list / Mandatory access control / Role-based access control / Privilege / WebDAV / User / PERMIS / Capability-based security / Superuser / NTFS

      Intentional Access Management: Making Access Control Usable for End-Users

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-13 14:38:51
      8

      Wooster: Mandatory Access Control for Rails  Julian Bangert, Alexander Lin, Julia Huang    Abstract    We introduce Wooster, a system for enforcing flexible mandatory access control policies 

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:49:57
        9Computer architecture / Software / System software / Monolithic kernels / Kernel / PaX / Linux kernel / Mandatory access control / Debian / Operating system kernels

        Hardened kernels for everyone Yves-Alexis Perez Kernel Recipes 2015

        Add to Reading List

        Source URL: perso.corsac.net

        Language: English
        10Computing / Software / Computer architecture / Memory management / Access control / Central processing unit / Virtual memory / Subroutines / Memory protection / Kernel / Capability-based addressing / Mandatory access control

        CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§ Nacho Navarro∗

        Add to Reading List

        Source URL: www.mulix.org

        Language: English - Date: 2016-06-16 09:04:37
        UPDATE