<--- Back to Details
First PageDocument Content
Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare
Date: 2012-05-15 06:38:22
Computer network security
Information security
Security controls
Vulnerability
Threat
Authentication
Attack
Access control
Authorization
Security
Computer security
Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncix.gov

Download Document from Source Website

File Size: 722,63 KB

Share Document on Facebook

Similar Documents

Ethernet / Security / Computing / Access control / Computer security / Identity management / Perimeter security / Physical security / USB / Door / Power over Ethernet / Network switch

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Computational complexity theory / Cryptography / Complexity classes / Theory of computation / NP / IP / Advice / PP / P / Soundness / Commitment scheme / Certificate

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document