Mandatory access control

Results: 211



#Item
111Role-based access control / PERMIS / Role hierarchy / Distributed computing / Ring / Mandatory access control / Transparency / AGDLP / Delegation in IT / Computer security / Security / Access control

Push Architectures for User Role Assignment Venkata Bhamidipati and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department George Mason University fvbhamidi, sandhug@gm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
112Access control / Trusted Computer System Evaluation Criteria / Operating system / Loadable kernel module / Bell–LaPadula model / Kernel / File system / Discretionary access control / Biba Model / Computer security / National Security Agency / Mandatory access control

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
113Role-based access control / Database management system / Mandatory access control / AGDLP / Security / Access control / Computer security

Business Process Driven Framework for defining an Access Control Service based on Roles and Rules Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
114Unified Modeling Language / Diagrams / Knowledge representation / Mandatory access control / Principle of least privilege / Bell–LaPadula model / Discretionary access control / Capability-based security / Profile / Computer security / Security / Access control

Towards the Formal Modeling of a Secure Operating System Dan Zhou Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
115Access control / Mandatory access control / Information security / Security controls / XACML / Role-based access control / Health Insurance Portability and Accountability Act / Security policy / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-11-20 12:11:33
116FTP clients / Internet Explorer / News aggregators / Windows Vista / Mandatory Integrity Control / Windows XP / User Account Control / Mandatory access control / Privilege escalation / Microsoft Windows / Software / Computing

WHITE PAPER Security Solutions Escaping from Microsoft’s Protected Mode Internet Explorer

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-12-01 19:00:00
117Linux / Red Hat Enterprise Linux / Evaluation / Security-Enhanced Linux / Mandatory access control / Linux kernel / Evaluation Assurance Level / Security-focused operating system / Red Hat cluster suite / Computer security / Software / Red Hat

Red Hat Enterprise Linux Security © 2009 specialized copyright information. If none, please delete this textbox. www.redhat.com

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2009-10-06 10:21:41
118System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
119Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
120Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
UPDATE