LOMAC

Results: 5



#Item
1Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
2

PlusD D Public Library of US Dipl Diplomacy lomac

Add to Reading List

Source URL: www.wikileaks.org

Language: English - Date: 2013-04-04 20:41:44
    3Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security

    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2006-02-09 00:36:18
    4LOMAC / Linux / Application programming interfaces / Mandatory access control / Kernel / Loadable kernel module / Linux kernel / System call / Unix / Software / System software / Computer architecture

    USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference

    Add to Reading List

    Source URL: alum.wpi.edu

    Language: English - Date: 2004-08-23 17:55:18
    5Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC

    PDF Document

    Add to Reading List

    Source URL: alum.wpi.edu

    Language: English - Date: 2004-08-23 17:54:47
    UPDATE