LOMAC
Results: 5
# | Item |
---|---|
1![]() | DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)Add to Reading ListSource URL: www.scs.stanford.eduLanguage: English - Date: 2010-03-04 18:26:58 |
2![]() | PlusD D Public Library of US Dipl Diplomacy lomacAdd to Reading ListSource URL: www.wikileaks.orgLanguage: English - Date: 2013-04-04 20:41:44 |
3![]() | Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent JaegerAdd to Reading ListSource URL: www.isoc.orgLanguage: English - Date: 2006-02-09 00:36:18 |
4![]() | USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical ConferenceAdd to Reading ListSource URL: alum.wpi.eduLanguage: English - Date: 2004-08-23 17:55:18 |
5![]() | PDF DocumentAdd to Reading ListSource URL: alum.wpi.eduLanguage: English - Date: 2004-08-23 17:54:47 |