Computer access control

Results: 4654



#Item
951Embedded Linux / Smartphones / Windows NT architecture / Cross-platform software / Android / Mandatory access control / Architecture of Windows NT / Kernel / Linux Security Modules / Computing / Software / Computer architecture

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:32
952Data security / Crime prevention / Evaluation / Common Criteria / Protection Profile / Federal Office for Information Security / Information security / Extended Access Control / BSI / Security / National security / Computer security

Assurance Continuity Maintenance Report BSI-CC-PP-0056-V2-2012-MA-02

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:24:07
953Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
954Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
955

Resonance: Dynamic Access Control for Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science, Georgia Tech ABSTRACT

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2009-07-22 15:07:00
    956

    UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, DBremen, German

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2014-12-03 04:25:47
      957Crime prevention / National security / Computer network security / Password / Authorization / Computer security / Authentication / Credential / Password policy / Security / Identity management / Access control

      PDF Document

      Add to Reading List

      Source URL: www.cisecurity.org

      Language: English - Date: 2015-03-11 09:33:03
      958Computer security / Password / Single sign-on / Login / DreamSpark Premium / Federated identity / Access control / Security

      2010 No2 University Makes Resetting Passwords Easy Roskilde University controls staff and student access to IT systems via the national digital identity solution which WAYF is connected to. The system lets users reset pa

      Add to Reading List

      Source URL: wayf.dk

      Language: English - Date: 2012-04-24 06:59:18
      959Crime prevention / Security engineering / PlayStation Portable / Computer security / Critical infrastructure protection / Telephone numbers in the United Kingdom / Access control / Physical security / Security guard / Security / National security / Public safety

      DOC Document

      Add to Reading List

      Source URL: www.usbr.gov

      Language: English - Date: 2015-05-21 12:53:14
      960Identity / Federated identity / Internet standards / Access control / Security Assertion Markup Language / Shibboleth / Authentication / Single sign-on / Credential / Identity management / Security / Computer security

      INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

      Add to Reading List

      Source URL: incommonfederation.org

      Language: English - Date: 2008-08-19 17:41:07
      UPDATE