Mandatory access control

Results: 211



#Item
11

Enabling Government and Business Transformation With Mandatory Access Control Security December 2006

Add to Reading List

Source URL: www.tresys.com

Language: English - Date: 2014-07-23 16:59:18
    12Computing / Software / Computer architecture / Smartphones / Wireless / Android / Mobile operating systems / Near field communication / Google Play / Mobile app / IOS / Mandatory access control

    What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-11-16 12:12:29
    13System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control

    Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2014-03-25 14:11:54
    14

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      15

      Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2008-02-07 14:26:30
        16Computer security / Security / Access control / Computer access control / Role-based access control / PERMIS / Mandatory access control / Social networking service / Interpersonal ties / Social network / NIST RBAC model

        Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

        Add to Reading List

        Source URL: w2spconf.com

        Language: English - Date: 2012-02-07 16:10:02
        17Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:06
        18Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

        A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:12
        19

        Mandatory Access Control at the Object Level in the Java Virtual Machine Vivek Haldar Michael Franz University of California Irvine, CA 92697 +

        Add to Reading List

        Source URL: www.vivekhaldar.com

        Language: English - Date: 2005-12-09 20:49:49
          20Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

          Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

          Add to Reading List

          Source URL: www.niap-ccevs.org

          Language: English - Date: 2009-10-08 10:40:04
          UPDATE