Control system security

Results: 2384



#Item
171Computing / Domain name system / Port / Transmission Control Protocol / Name server / DNS spoofing / Dan Kaminsky / Internet / Network architecture / Internet protocols

JPJ8;D@E Security Lessons K_\jf]kZ_\npZ\ek\if]k_\@ek\ie\k

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
172National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
173Prevention / United Kingdom labour law / Security / Industrial hygiene / Occupational safety and health / Fall arrest / Safety

Codes of Safe Practices ! CONTROL ACCESS ZONE (Safety Monitoring System) A Control Access Zone is used for leading edge or fixed edge work where a minimum distance

Add to Reading List

Source URL: domesticproduction.com

Language: English - Date: 2013-04-17 19:27:07
174Security / National security / Computer security / Industrial automation / SCADA / Security engineering / Remote Terminal Unit / Critical infrastructure protection / Industrial control system / Telemetry / Technology / Computer network security

FP7-SECProjectCyber-security on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D4.2 - Automatic Reaction Strategies and RTU

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2015-04-04 09:28:29
175Telemetry / Industrial automation / Automation / National security / SCADA / Cyber-security regulation / Industrial control system / IEC 61508 / Critical infrastructure protection / Technology / Security / Computer security

TECHNICAL STUDIES Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

Add to Reading List

Source URL: www.clusif.fr

Language: English - Date: 2014-09-16 09:37:13
176Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
177

KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

Add to Reading List

Source URL: ieee-security.org

- Date: 2014-04-21 13:48:10
    178

    THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

    Add to Reading List

    Source URL: www.cis.famu.edu

    Language: English - Date: 2009-01-14 09:27:09
      179

      Account Pro Version 9.1 Help on Installation Operating System MS Vista User Account Control (UAC) in Windows Vista? Windows Vista has the built-in ability to automatically reduce the potential of security breeches in

      Add to Reading List

      Source URL: www.accsoft.ch

      Language: English - Date: 2008-01-31 11:23:54
        180

        2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2013-05-05 16:04:42
          UPDATE