Mandatory access control

Results: 211



#Item
21Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
22Hacking / Capsicum / Capability-based security / Thread / Mandatory access control / Exception handling / Operating system / Vulnerability / C / Computing / Computer security / Software engineering

CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-09 14:29:53
23Bell–LaPadula model / Mandatory access control

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-03-06 16:24:21
24National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
25Software / Common Criteria / Mandatory access control / National Information Assurance Partnership / Evaluation Assurance Level / Linux kernel / Security-Enhanced Linux / Linux / Protection Profile / Computer security / Evaluation / Computing

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
26Embedded Linux / Smartphones / Windows NT architecture / Cross-platform software / Android / Mandatory access control / Architecture of Windows NT / Kernel / Linux Security Modules / Computing / Software / Computer architecture

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:32
27Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
28Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
29

AppPolicyModules: Mandatory Access Control for Third-Party Apps Enrico Bacis Simone Mutti

Add to Reading List

Source URL: cs.unibg.it

- Date: 2015-04-21 09:55:09
    30

    1995 Paper 7 Question 8 Security Explain the difference between discretionary and mandatory access control. [3 marks] Describe the Bell–LaPadula security policy model.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:04
      UPDATE