Capability-based security

Results: 256



#Item
71Capability approach / Amartya Sen / Justice / Development as Freedom / Development economics / Capability-based security / Need / Nussbaum / Development / Economics / Welfare economics

References Appadurai, AThe capacity to aspire: Culture and the terms of recognition. In: V. Rao and M. Walton (Eds.), Culture and public action: A cross disciplinary dialog in development policy. Stanford Unive

Add to Reading List

Source URL: www.theewc.org

Language: English - Date: 2013-10-09 16:15:42
72Capability-based security / Kernel / Hydra / Ring / Operating system / C.mmp / Loadable kernel module / Mach / Object Manager / Computer architecture / Computing / Access control

Introduction Operating Systems C. Weissman

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2002-11-20 22:22:25
73Email forwarding / Server

8.Security Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thou

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:46
74Law / Public legal education / Social philosophy / Legal education / Access control / Capability-based security

Measuring young people’s legal capability Research report July 2009

Add to Reading List

Source URL: lawforlife.org.uk

Language: English - Date: 2013-06-15 15:01:10
75Education / Capability-based security / Program evaluation / Victorian Essential Learning Standards / Public legal education / Sociology / Evaluation / Humanities / Law

PUBLIC LEGAL EDUCATION EVALUATION FRAMEWORK PRODUCED BY: SHARON COLLARD AND DR CHRIS DEEMING PERSONAL FINANCE RESEARCH CENTRE

Add to Reading List

Source URL: lawforlife.org.uk

Language: English - Date: 2013-06-15 15:01:11
76Security / War / Anti-aircraft warfare / Military aviation / Capability-based security

Jason Clare - More than $12 million investment in Priority Industry Capabilities MEET JASON

Add to Reading List

Source URL: www.securesystems.com.au

Language: English - Date: 2012-10-17 00:51:29
77Virtual machines / Disk file systems / File descriptor / Capability-based security / File system / Open / Hyper-V / Procfs / Root directory / System software / Software / Unix

Proper: Privileged Operations in a Virtualised System Environment Steve Muir, Larry Peterson, Marc Fiuczynski Princeton University Justin Cappos, John Hartman University of Arizona

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:19
78Distributed file system / Network File System / File system / Client–server model / File server / Server / Capability-based security / Network-Attached Secure Disks / Blue Whale Clustered file system / Computing / Network file systems / System software

USENIX Association Proceedings of FAST ’03: 2nd USENIX Conference on File and Storage Technologies

Add to Reading List

Source URL: www.tim-mann.org

Language: English - Date: 2006-11-21 15:00:02
79Process management / Process capability / CPK / CP / Control chart / Capability-based security / Management / Statistics / Quality

Process Capability Analysis Process Capability Tools in the QI Macros Process capability determines if a process will deliver a product or service that meets the customers requirements.

Add to Reading List

Source URL: www.qimacros.com

Language: English - Date: 2014-12-05 12:25:10
80Ted Peate / Capability-based security / Requirement / English grammar / Shall and will / Algorithm

NPOESS Preparatory Project (NPP) Science Data Segment (SDS) Ocean Product Evaluation and Analysis Tool Element (PEATE) Peer Review November 30, 2005

Add to Reading List

Source URL: oceancolor.gsfc.nasa.gov

Language: English
UPDATE