XTS-400

Results: 51



#Item
1The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
2rim  NRL Report 8806 :f. rr

rim NRL Report 8806 :f. rr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:49
3FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University  1

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
4A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory  Military systems that process classified information must operate in a secure manner; tha

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
5CEE Nov12 Edn_Features.qxd

CEE Nov12 Edn_Features.qxd

Add to Reading List

Source URL: download.beckhoff.com

Language: English - Date: 2012-11-02 12:07:56
6CASE STUDY  Center for Army Analysis (CAA) Customer

CASE STUDY Center for Army Analysis (CAA) Customer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
7Trusted Gateway System™  Secure Multi-Directional Data Transfer. Features and Benefits n	Included

Trusted Gateway System™ Secure Multi-Directional Data Transfer. Features and Benefits n Included

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
8Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
9Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 1999

Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 1999

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
10Common Criteria  Common Criteria for Information Technology Security Evaluation

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04