Back to Results
First PageMeta Content
Unix / Access control / User identifier / Setuid / Filesystem permissions / Mandatory access control / Principle of least privilege / Discretionary access control / Multilevel security / Computer security / Security / Computing


Document Date: 2004-03-30 13:44:01


Open Document

File Size: 2,45 MB

Share Result on Facebook

City

Any / Boston / /

Company

Trusted Systems (Aqua Book) Formal Verification Systems / SAIC / Impersonation Tokens (setuid?) Encrypted File Systems / B1 / uGroup / Computer Systems / Trusted Systems (Tan Book) Configuration Management / Afghanistan Middle East Israel uGroup / Windows / Intel / GE / /

Country

Israel / /

Currency

USD / /

Facility

Multics Relational Data Store / /

Holiday

Assumption / /

IndustryTerm

malicious applications / configuration management / bank / malicious system developers / remote systems / banking / /

OperatingSystem

Unix / Multics / Win 2000 / Linux / Windows 2000 / Microsoft Windows / Windows NT 4.0 / /

Organization

MIT / Policy Military / Canadian Department of Defense / Department of Defense / /

Person

John Mitchell / van Horn / Dennis / Matt Blaze / Henry Levy / Amber Book / /

Position

Administrator / model / formal covert channel analysis / role Administrator / lawyer / /

Region

Middle East / East Israel / /

Technology

encryption / Linux system / Unix / Linux / smart card / Operating System / Virtual memory / Operating Systems / Access Control List / /

URL

http /

SocialTag