Security-Enhanced Linux

Results: 107



#Item
11Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
12National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
13Software / Common Criteria / Mandatory access control / National Information Assurance Partnership / Evaluation Assurance Level / Linux kernel / Security-Enhanced Linux / Linux / Protection Profile / Computer security / Evaluation / Computing

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
14Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Linux kernel / Security-Enhanced Linux / Red Hat / National Information Assurance Partnership / Linux / Computing / Computer security / Software

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
15Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
16Automation / EPICS / ITER / Programmable logic controller / Security-Enhanced Linux / Physics / Technology / Science

IDM UID 34SDZ5 VERSION CREATED ON / VERSION / STATUS 08 FebApproved

Add to Reading List

Source URL: static.iter.org

Language: English - Date: 2013-05-15 11:56:50
17Evaluation / National Security Agency / Computer network security / Common Criteria / Secure Shell / OpenSSH / Operating system / System administrator / Security-Enhanced Linux / Computer security / Computing / System software

EAL3 Evaluated Configuration Guide for Red Hat Enterprise Linux Klaus Weidner <> June 29, 2004; v1.2 atsec is a trademark of atsec GmbH

Add to Reading List

Source URL: ltp.sourceforge.net

Language: English - Date: 2006-08-02 13:13:54
18Security-Enhanced Linux / Linux Security Modules / Type enforcement / Linux-VServer / Sandbox / Linux kernel / Operating system-level virtualization / Kernel / Operating system / System software / Software / National Security Agency

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract will later review several such approaches that enjoy de facto

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 09:16:06
19Role-based access control / Security-Enhanced Linux / PERMIS / Filesystem permissions / Multilevel security / Delegation in IT / AGDLP / Computer security / Security / Access control

Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 04:53:26
20National Security Agency / Data modeling / Decision theory / Security policy / Access control / Mandatory access control / Trusted Computer System Evaluation Criteria / EXPRESS / Security-Enhanced Linux / Computer security / Security / Policy

SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: 

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:24:30
UPDATE