Security-Enhanced Linux

Results: 107



#Item
71Identity management / Authorization / Information security / Database management system / PERMIS / Policy / Security-Enhanced Linux / Group Policy / Security / Computer security / Access control

PersPectives © West1 | Dreamstime.com A Matter of Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 13:04:28
72Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Proceedings Template - WORD

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:22:00
73XACML / Telecommunications / Interoperability / Policy / Role-based access control / Security-Enhanced Linux / Distributed firewall / Security / Computer security / Access control

Microsoft PowerPoint - Ferraiolo_Plenary.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-09-14 01:00:00
74Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
75Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
76Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
77Operating system / Debian / Cross-domain solution / Hardening / Access control / Ring / Security-Enhanced Linux / FLASK / Computer security / Mandatory access control / Type enforcement

White Paper Levels of Linux Operating System Security Owl Approach to the Hardening of Linux Abstract

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2012-02-15 13:02:55
78Computer network security / Trusted computing base / Operating system / Server / Trusted Computing / Kernel / Ring / XTS-400 / Security-Enhanced Linux / Computer security / Computer architecture / Security

/tardir/tiffs/a408173.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:23:12
79Electronic commerce / Computer network security / Public safety / Computer security / Secure communication / Security-Enhanced Linux / Information security / Security / Crime prevention / National security

Would we have the Provider Agency role for Enhanced Security by default or would at least someone have it in the agency? The Provider Agency role for Enhanced Security must be assigned by the Provider local administrat

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2013-12-05 07:58:18
80Linux / AppArmor / Whitelist / Security-Enhanced Linux / Software / System software / Computing

    CYBER SECURITY OPERATIONS CENTRE   NOVEMBER 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-07 01:09:55
UPDATE