<--- Back to Details
First PageDocument Content
National security / Data security / Evaluation / Trusted Computer System Evaluation Criteria / Labeled Security Protection Profile / Mandatory access control / Information security / Common Criteria / Access control / Computer security / Security / Crime prevention
Date: 2010-09-02 21:29:55
National security
Data security
Evaluation
Trusted Computer System Evaluation Criteria
Labeled Security Protection Profile
Mandatory access control
Information security
Common Criteria
Access control
Computer security
Security
Crime prevention

Add to Reading List

Source URL: www.commoncriteriaportal.org

Download Document from Source Website

File Size: 425,13 KB

Share Document on Facebook

Similar Documents

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

DocID: 1unUe - View Document

Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

DocID: 1t0cX - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

DocID: 1qsUu - View Document

Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

DocID: 1pYGG - View Document