Capability-based security

Results: 256



#Item
31An Overview of the Annex System D.A. Grove T.C. Murray  C.A. Owen C.J. North J.A. Jones M.R. Beaumont

An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2007-12-17 22:49:19
32Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net  1

Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net 1

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2011-02-12 20:29:24
33Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:51
34On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr  University of Minnesota

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
35UIDA Consulting Group, Inc. United Indian Development Association

UIDA Consulting Group, Inc. United Indian Development Association

Add to Reading List

Source URL: navajobusiness.com

Language: English - Date: 2012-05-01 12:15:10
36Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 4 Access Control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
37Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
38http://www.inclusivedesigntoolkit.com/TEST_site/usercapabilitie

http://www.inclusivedesigntoolkit.com/TEST_site/usercapabilitie

Add to Reading List

Source URL: www.inclusivedesigntoolkit.com

Language: English - Date: 2015-03-19 08:21:57
39NRL ReportBest Available Technologies (BATs) for Computer Security CARL

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16
40RINA Conference, WARSHIP – 13 June, Bath, UK  HOW TO SQUARE THE CIRCLE FOR THE NEXT GENERATION OF PATROL SHIP DESIGNS A Kimber, BEng, CEng, MRINA, BMT Defence Services Ltd, UK. B Thorne, BEng Hons C Eng, MIMech

RINA Conference, WARSHIP – 13 June, Bath, UK HOW TO SQUARE THE CIRCLE FOR THE NEXT GENERATION OF PATROL SHIP DESIGNS A Kimber, BEng, CEng, MRINA, BMT Defence Services Ltd, UK. B Thorne, BEng Hons C Eng, MIMech

Add to Reading List

Source URL: www.bmtdsl.co.uk

Language: English - Date: 2013-07-11 04:46:46