Capability-based security

Results: 256



#Item
141Classes of computers / Instruction set architectures / Access control / Capability-based security / Burroughs large systems / 64-bit / Pointer / Virtual memory / Reduced instruction set computing / Computer architecture / Computing / Computer hardware

CTSRD CTS CRASH-worthy Trustworthy

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-03 06:56:25
142Role-based access control / XACML / Discretionary access control / PERMIS / Information security / Authorization / Security management / Capability-based security / Federal Information Security Management Act / Security / Computer security / Access control

NIST 7316, Assessment of Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-15 09:51:53
143Market research / Marketing / Psychometrics / Economics / Financial literacy / Business / Finance / Capability-based security / Statistics / Educational psychology / Factor analysis

Understanding Financial Capability in Canada Analysis of the Canadian Financial Capability Survey Stephen McKay

Add to Reading List

Source URL: publications.gc.ca

Language: English - Date: 2011-04-13 15:45:17
144Healthcare Information Technology Standards Panel / Health / Consent management / Computing / Interoperability / Web conferencing / Capability-based security / Medical informatics / Standards organizations / Medicine

HITSP Communicate Referral Authorization Capability Public Review Administration and Finance Domain Technical Committee October 1, 2009 HITSP Capabilities Public Review Webinar

Add to Reading List

Source URL: publicaa.ansi.org

Language: English - Date: 2009-10-02 11:30:42
145Access control / Portable software / Text mode / Wget / Capability-based security / Capsicum / Process / Computer program / Programming language / Computing / Software / Security

Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡ ∗ { wrharris, jha, reps }@cs.wisc.edu; Uni

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-04-12 08:14:32
146Electronic engineering / Electronics / Law / Conference call / Call sign / Capability-based security

PBA Committee/Section Day

Add to Reading List

Source URL: www.pabar.org

Language: English - Date: 2014-11-19 11:26:29
147Central processing unit / Ring / Kernel / Hydra / Privilege escalation / Sandbox / Capability-based security / Operating system / Microkernel / System software / Computer architecture / Computer security

Towards a Theory of Application Compartmentalisation Robert N. M. Watson1 , Steven J. Murdoch1 , Khilan Gudka1 , Jonathan Anderson1 , Peter G. Neumann2 , and Ben Laurie3 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-06-18 12:39:15
148Security / Management / Strategic management / ESCM-SP / Information technology management / Access control / Capability-based security

PDF Document

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2014-07-10 01:36:46
149Unified Modeling Language / Diagrams / Knowledge representation / Mandatory access control / Principle of least privilege / Bell–LaPadula model / Discretionary access control / Capability-based security / Profile / Computer security / Security / Access control

Towards the Formal Modeling of a Secure Operating System Dan Zhou Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
150Access control / Capability-based security / Internet search engines

National Archives and Records Administration 860] Adelphi Road College Park, Maryland[removed]Date

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2011-01-10 14:04:54
UPDATE