Discretionary access control

Results: 58



#Item
1Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

Add to Reading List

Source URL: seclab.illinois.edu

Language: English
    2What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-11-16 12:12:29
    3Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      4Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2008-02-07 14:26:30
        5Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

        Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

        Add to Reading List

        Source URL: fc12.ifca.ai

        Language: English - Date: 2012-02-18 14:33:45
          6DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

          DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2010-03-04 18:26:58
          7DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a file private so only group friends can read it

          DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a file private so only group friends can read it

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2008-03-06 16:24:21
          8DAC vs. MAC  Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

          DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

          Add to Reading List

          Source URL: www.scs.stanford.edu

          Language: English - Date: 2010-03-04 18:26:58
          9Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

          Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

          Add to Reading List

          Source URL: swerl.tudelft.nl

          Language: English - Date: 2008-04-25 16:21:05
          101995 Paper 7 Question 8  Security Explain the difference between discretionary and mandatory access control. [3 marks] Describe the Bell–LaPadula security policy model.

          1995 Paper 7 Question 8 Security Explain the difference between discretionary and mandatory access control. [3 marks] Describe the Bell–LaPadula security policy model.

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          - Date: 2014-06-09 10:17:04