Mandatory access control

Results: 211



#Item
91Trusted Computer System Evaluation Criteria / Trusted computing / CTCPEC / ITSEC / Trusted computing base / Mandatory access control / Common Criteria / XTS-400 / Computer security / Evaluation / National Security Agency

A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-01-07 00:22:22
92Mandatory access control / Seccomp / Chroot / System software / Software / Sandbox

Secure and Simple Sandboxing in SELinux James Morris [removed] FOSS.my 2009

Add to Reading List

Source URL: selinuxproject.org

Language: English - Date: 2009-10-24 03:19:35
93Computer network security / Virtual private networks / Cryptographic protocols / Internet protocols / Tunneling protocols / IPsec / Security-Enhanced Linux / Type enforcement / Mandatory access control / Computer security / Computing / Computer architecture

Leveraging IPsec for Distributed Authorization Trent Jaeger∗ David King∗ Kevin Butler∗ Jonathan McCune◦ Ram´on C´aceres† Serge Hallyn‡ Joy Latten‡ Reiner Sailer† Xiolan Zhang† ∗ Department of Compu

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2014-03-17 18:02:35
94Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Mandatory access control / Filesystem permissions / Modal logic / Datalog / Computer security / Security / Access control

Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2014-09-26 16:58:51
95Android / National Security Agency / Security-Enhanced Linux / Embedded Linux / Smartphones / Mandatory access control / FLASK / Type enforcement / Linux kernel / Software / System software / Computer security

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:42
96Android / Embedded Linux / Smartphones / Mandatory access control / Dalvik / Sandbox / Linux kernel / Privilege escalation / Operating system / Software / System software / Computing

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
97Embedded Linux / Smartphones / National Security Agency / Security-Enhanced Linux / Mandatory access control / Android / Linux kernel / Motorola Droid / Privilege escalation / Software / Computing / Computer security

Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.incose-cc.org

Language: English - Date: 2013-08-29 11:50:21
98Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 00:20:20
99Access control list / Access token / Mandatory Integrity Control / Security / Computer security / Access control

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19
UPDATE