Mandatory access control

Results: 211



#Item
31Bell–LaPadula model / Organisation-based access control / Mandatory access control / Structure / Secure state / Cyberwarfare / Security / Metalogic / Model theory

Towards a formal specification of access control Mathieu Jaume and Charles Morisset SPI – LIP6 – University Paris 6, 8 rue du Capitaine Scott, Paris 75015, France, ,

Add to Reading List

Source URL: focalize.inria.fr

Language: English - Date: 2006-08-29 07:34:00
32National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention

Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:38
33Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Trusted system / Information security / Classified information / Security policy / Computer security / Security / National security

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
34Mandatory access control / HTTP cookie / Access control / Form / Database / JavaScript / Web application framework / Google Chrome / HTML / Computing / Software / Database management systems

Hails: Protecting Data Privacy in Untrusted Web Applications Daniel B. Giffin, Amit Levy, Deian Stefan David Terei, David Mazi`eres, John C. Mitchell Stanford Abstract

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-10-19 15:09:55
35Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART Two

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
36Capability-based security / Intel iAPX 432 / Discretionary access control / Kernel / Authorization / Capability-based addressing / Mandatory access control / Security / Computer security / Access control

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
37Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
38Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
39Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
40Linux kernel / Monolithic kernels / Kernel / Grsecurity / Rootkit / Ring / PaX / Loadable kernel module / Mandatory access control / System software / Software / Computer architecture

Intrusion detection for resource-constrained embedded control systems in the power grid

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
UPDATE