<--- Back to Details
First PageDocument Content
Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software
Date: 2012-03-26 14:41:48
Software
Database management systems
Intrusion detection system
Secure communication
Electronic commerce
Multilevel security
Mandatory access control
XTS-400
Snort
Computer security
Computer network security
System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Download Document from Source Website

File Size: 1,00 MB

Share Document on Facebook

Similar Documents

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

DocID: 1unUe - View Document

Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

DocID: 1t0cX - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

DocID: 1qsUu - View Document

Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

DocID: 1pYGG - View Document