<--- Back to Details
First PageDocument Content
Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC
Date: 2004-08-23 17:54:47
Information theory
Privilege revocation
Evaluation
Mandatory Integrity Control
Ring
Operating system
Data integrity
Unix
Role-based access control
Computer security
Security
LOMAC

Add to Reading List

Source URL: alum.wpi.edu

Download Document from Source Website

File Size: 124,68 KB

Share Document on Facebook

Similar Documents

Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DocID: 1fuvr - View Document

Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

DocID: 1ftXw - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 15AiT - View Document

Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

DocID: 14Ysl - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 141br - View Document