Mandatory access control

Results: 211



#Item
101Data security / Crime prevention / National security / Information security / Mandatory access control / Vulnerability / Threat / Security engineering / Access control / Security / Computer security / Cyberwarfare

A Taxonomy of Organisational Security Policies Dr. Gary W. Smith and Richard B. Newton Science Applications International Corporation McLean, VA Abstract: although the Common Criteria provides an exhaustive list of secur

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
102Personal computers / Mandatory access control / Linux / Access control / Macintosh / Computing / Software / Computer security

Policy-Enhanced Linux An Educational Tool Paul C. Clark [removed] Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
103Computer network security / Crime prevention / National security / Multilevel security / Trusted computing / XTS-400 / Mandatory access control / Multiple single-level / Cloud computing / Computer security / Computing / Security

Microsoft Word - MYSEA-MILCOM10-Final.docx

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:52:58
104Role-based access control / Role hierarchy / Mutual exclusion / Separation of duties / Mandatory access control / Security / Computer security / Access control

Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:37:28
105Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-03-26 14:41:48
106National security / Evaluation / Computer network security / Trusted computing base / Multilevel security / National Information Assurance Partnership / Mandatory access control / Trusted Computer System Evaluation Criteria / Common Criteria / Computer security / Security / Crime prevention

Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:53:03
107XTS-400 / Windows Server / Multilevel security / Multiple single-level / Mandatory access control / Client–server model / Security-Enhanced Linux / Trusted computing base / Server / Computer security / Computer network security / Evaluation

MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-03-24 14:46:06
108Mandatory Integrity Control / File system / Mandatory access control / Operating system / Data integrity / Loadable kernel module / Computer file / Kernel / Computer security / Security / System software

An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed] Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
109Computer network security / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Authorization / Role-based access control / XACML / Mandatory access control / Security / Computer security / Access control

Implementation of Multiple Access Control Policies within a CORBASEC framework Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
110Role-based access control / PERMIS / Mandatory access control / Discretionary access control / NIST RBAC model / Computer security / Security / Access control

The OM-AM Framework and Role-Based Access Control Prof. Ravi Sandhu George Mason University www.list.gmu.edu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE