Multilevel security

Results: 163



#Item
1Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
2Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
3Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
4National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
5

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: Hebrew
    6

    Analysis of Three Multilevel Security Architectures Timothy E. Levin Cynthia E. Irvine Naval Postgraduate School Naval Postgraduate School

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:16
      7

      MYSEA MLS Testbed Multilevel Security for Cross-Domain Sharing Project Objective Experimentation framework for research on high assurance distributed multilevel security (MLS). Provide a coherent view of cross-domain inf

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:19
        8Computer security / Computer architecture / Computing / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Lynx Software Technologies / Kernel / Lockheed Martin / MLS / Guard / Protection ring

        PDF Document

        Add to Reading List

        Source URL: swa.omg.org

        Language: English - Date: 2006-12-14 08:55:42
        9Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

        Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

        Add to Reading List

        Source URL: www.niap-ccevs.org

        Language: English - Date: 2009-10-08 10:40:04
        10National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

        Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

        Add to Reading List

        Source URL: www.scs.stanford.edu

        Language: English - Date: 2009-12-29 17:31:13
        UPDATE