Back to Results
First PageMeta Content
Computer network security / Crime prevention / National security / Multilevel security / Trusted computing / XTS-400 / Mandatory access control / Multiple single-level / Cloud computing / Computer security / Computing / Security


Microsoft Word - MYSEA-MILCOM10-Final.docx
Add to Reading List

Document Date: 2010-11-15 16:52:58


Open Document

File Size: 416,98 KB

Share Result on Facebook

City

Glenwood / Las Vegas / Hoboken / Monterey / Orlando / Bedford / Fairfax / Setubal / Berlin / Atlantic City / Phoenix / San Diego / Chicago / /

Company

The MITRE Corporation / Naval Research Laboratory / Trusted Information Systems Inc. / BAE Systems Information Technology LLC / the Boeing / Wang Government Services incorporated / Green Hills Software / John Wiley and Sons / Dynamic Security Services / IBM / IEEE Computer / Computer Science Laboratory / KEY CONCEPTS AND TECHNOLOGIES / SRI International / MYSEA / MLS LAN / Multimedia Systems / /

Country

Portugal / United States / /

Currency

STD / /

/

Facility

FIPS PUB / National Institute of Standards and Technology / Hanscom AFB / Information Technology Laboratory / Naval Research Laboratory / Georgia Institute of Technology College / /

IndustryTerm

information technology security evaluation public version / security-relevant communications / physical network / dynamic management / secure systems / open source operating systems / high assurance computing base / client software / web browsing / assurance server / local area networks / power-cycle protocol / cryptographic algorithm / cloud applications / security management / web-based mechanisms / singlelevel networks / defense / external server / cross-domain computing environment / external single-level server / cryptographic security services / remote networks / application software / service-based access control policy / Internet Protocol security / cryptographic algorithms / software acting / policy-based management / Internet Protocol / avionics systems / communication protocols / secure operating systems / computing / cloud computing environment / particular network / cloud computing functionality / collaborative applications / real-time embedded systems / cloud services / command-respond protocol / cross-domain services / local area network / unmodified office productivity tools / security technology / typical secure systems / multilevel secure computing service / distributed multilevel file server / cross-domain collaborative applications / technology categories / automatic revocation / malicious software / information technology security evaluation / external networks / resource-sharing systems / software applications / security services / individual applications / web-based interface / remote single-level networks / external intrusion detection systems / cloud computing / cross domain solution / Internet Key Exchange / web server process / collaborative application services / /

OperatingSystem

Microsoft Windows / XTS / Linux / Multics / Windows NT / /

Organization

office of Naval Research / U.S. Government / National Computer Security Center / Department of Defense Computer Security Center / Protected Communications Service / Security Service / North Atlantic Treaty Organization / National Institute of Standards and Technology / Georgia Institute of Technology College of Computing / Air Force Electronic Systems Division / Information Technology Laboratory / National Reconnaissance Office / Cynthia E. Irvine Department of Computer Science / Federated Security Service / Internet Society / Generic security service / Trusted Channel Service / National Security Agency / Naval Postgraduate School / Unified Cross Domain Management Office / Committee on National Security Systems / Association for Computing Machinery / Secure Session Service / Trusted Path Service / Trusted Remote Session Service / Department of Defense / /

Person

P. C. Clark / Thuy D. Nguyen / Cynthia E. Irvine / D. Schroeder / C. Prince / C. E. Irvine / J. Khosalim / D. J. Shifflett / T. E. Levin / T. Levin / M. Gondree / T. D. Nguyen / G. W. Dinolt / E. Spyropoulou / Mark A. Gondree / David J. Shifflett / C. Kaufman / Timothy E. Levin / Jean Khosalim / /

Position

system administrator / data guard / SeaView security model / ” Proc. / administrator / Editor / Manager / conceptual model for dynamic management / network guard / Federated Services Manager / Prince / /

Product

IPsec / Cloud / Cloud Software / /

ProgrammingLanguage

EC / SQL / /

ProvinceOrState

Virginia / California / Georgia / Arizona / New Jersey / Maryland / Illinois / Nevada / Florida / Massachusetts / /

PublishedMedium

Communications of the ACM / /

SportsEvent

EPL / /

Technology

HTTP protocols / Linux / information technology / PKI / operating system / Quality of Service / TCP/IP protocol / access control list / Cryptography / power-cycle protocol / security technology / IPsec protocols / TCP-based command-respond protocol / virtual machine / IPv6 / IP / operating systems / communication protocols / Secure Communications Processor / local area networks / VOIP / web server / /

URL

http /

SocialTag