Bell–LaPadula model

Results: 41



#Item
21Crime prevention / National security / Information flow / Information theory / Information security / Covert channel / Bell–LaPadula model / Security policy / Mandatory access control / Computer security / Security / Cyberwarfare

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-11-25 05:03:09
22Actuarial science / Crime prevention / National security / Bell–LaPadula model / Risk / Information security / Access control / Fuzzy logic / Type enforcement / Security / Computer security / Public safety

Fuzzy MLS: An Experiment on Quantified Risk–Adaptive Access Control Pau–Chen Cheng [removed] Pankaj Rohatgi

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-17 08:58:09
23Secure communication / Trusted computing / National security / Trusted system / Multics / Bell–LaPadula model / Trusted Computer System Evaluation Criteria / Operating system / Secure state / Computer security / Security / Computer network security

Looking Back at the Bell-La Padula Model David Elliott Bell Reston VA, 20191 December 7, 2005 Abstract

Add to Reading List

Source URL: selfless-security.offthisweek.com

Language: English - Date: 2009-04-05 14:51:44
24Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Trusted system / Information security / Classified information / Security policy / Computer security / Security / National security

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
25Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
26Crime prevention / National security / Computer network security / Clark–Wilson model / Information security / Biba Model / Security policy / Data integrity / Bell–LaPadula model / Computer security / Security / Public safety

A Comparison of Commercial

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-04-18 12:21:08
27Crime prevention / National security / Computer network security / Clark–Wilson model / Information security / Biba Model / Security policy / Data integrity / Bell–LaPadula model / Computer security / Security / Public safety

A Comparison of

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-12-15 12:46:55
28Biba Model / Crime prevention / National security / Bell–LaPadula model / Mandatory Integrity Control / CDIS / Integrity / XTS-400 / Computer security / Security / Clark–Wilson model

Chapter 6: Integrity Policies • •

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-08-09 18:13:20
29Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
30Steganography / Computer network security / NSD / Trusted Computer System Evaluation Criteria / Multilevel security / Bell–LaPadula model / Network security / Mediation / Overt channel / Computer security / Security / Covert channel

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
UPDATE