Capability-based security

Results: 256



#Item
241Access control / Capability-based security

PDF Document

Add to Reading List

Source URL: humanresearchroadmap.nasa.gov

- Date: 2013-08-19 14:16:35
242Law / Rights / Capability approach / Capability-based security / Amartya Sen / Martha Nussbaum / Human rights / Development as Freedom / Natural and legal rights / Ethics / Development / Philosophy

PDF Document

Add to Reading List

Source URL: www.unicef.org

Language: English - Date: 2013-10-03 16:16:21
243Computer network security / Access control / Capability-based security / Computer security / Kernel / Object-capability model / Operating system / Programming language / Linux kernel / Computing / Computer architecture / Security

PDF Document

Add to Reading List

Source URL: www.info.ucl.ac.be

Language: English - Date: 2004-12-03 12:46:43
244Windows NT architecture / Kernel / Real-time operating systems / Capability-based security / Operating system / Object Manager / Ring / PSOS / Multilevel security / Computer security / Security / Computer architecture

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2003-07-16 12:45:30
245Object-oriented programming / Cross-platform software / Computer security / Object-capability model / Java / Joe-E / Capability-based security / Object / Immutable object / Computing / Software engineering / Computer programming

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:49
246National Security Agency / National security / Bell–LaPadula model / Mandatory access control / Discretionary access control / Trusted Computer System Evaluation Criteria / Trusted system / Access Control Matrix / Capability-based security / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1999-04-01 11:22:57
247Capability-based security / Object-capability model / EROS / Access Control Matrix / Ambient authority / C-list / Infrastructure optimization / Confused deputy problem / KeyKOS / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: srl.cs.jhu.edu

Language: English - Date: 2007-09-20 09:41:43
248Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

PDF Document

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-08-09 20:58:19
249Computer network security / Multilevel security / Mandatory access control / Ring / Trusted system / Operating system / Capability-based security / Kernel / Security policy / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: cs.unomaha.edu

Language: English - Date: 2004-09-02 16:22:23
250Crime prevention / National security / Data security / Computer network security / Capability-based security / Operating system / Software quality / Ring / Reliability engineering / Security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 15:26:46
UPDATE