<--- Back to Details
First PageDocument Content
Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software
Date: 2012-03-26 14:41:48
Software
Database management systems
Intrusion detection system
Secure communication
Electronic commerce
Multilevel security
Mandatory access control
XTS-400
Snort
Computer security
Computer network security
System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Download Document from Source Website

File Size: 1,00 MB

Share Document on Facebook

Similar Documents

Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

DocID: 1qCHd - View Document

Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

DocID: 1qe75 - View Document

Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

DocID: 1pV0t - View Document

National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

DocID: 1pekr - View Document

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

DocID: 1lfak - View Document