Mandatory Integrity Control

Results: 28



#Item
11Cloud clients / Portable software / Sandbox / Computer security / Arbitrary code execution / Privilege escalation / Malware / Mandatory Integrity Control / Vulnerability / Software / Google Chrome / Software testing

Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [removed] Rahul Kashyap [removed] What is a sandbox? In computer security terminology, a sandbox is an environment designed to run untrusted

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-04-10 18:42:25
12Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:18
13Computer network security / Public safety / Safety / Electronic commerce / Computer security / Secure communication / Wireless security / Mandatory Integrity Control / Security / Crime prevention / National security

Banner Finance Security Types of Security

Add to Reading List

Source URL: www.csu.edu.au

Language: English - Date: 2011-07-26 21:33:36
14System software / Malware / Sandbox / Application security / Mandatory Integrity Control / Mandatory access control / Internet security / Windows Vista / Spyware / Computer network security / Computer security / Security

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2013-02-05 23:03:43
15Access control list / Access token / Mandatory Integrity Control / Security / Computer security / Access control

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19
16Mandatory Integrity Control / File system / Mandatory access control / Operating system / Data integrity / Loadable kernel module / Computer file / Kernel / Computer security / Security / System software

An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed] Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
17FTP clients / Internet Explorer / News aggregators / Windows Vista / Mandatory Integrity Control / Windows XP / User Account Control / Mandatory access control / Privilege escalation / Microsoft Windows / Software / Computing

WHITE PAPER Security Solutions Escaping from Microsoft’s Protected Mode Internet Explorer

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-12-01 19:00:00
18System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
19Crime prevention / National security / Evaluation / Biba Model / Multilevel security / Integrity / Data integrity / Information security / Mandatory Integrity Control / Computer security / Security / Computing

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Data Integrity Limitations in

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2009-01-28 17:59:59
20Computer network security / Cyberwarfare / Hacking / Sandbox / Malware / Type enforcement / Stuxnet / SCADA / Mandatory Integrity Control / Software / Computer security / System software

I ’ V E B E E N A C C U S E D , R I G H T LY, O F B E I N G RIK FARROW musings Rik is the Editor of ;login:. [removed]

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2011-04-20 18:11:22
UPDATE