Mandatory access control

Results: 211



#Item
51Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
52Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
53Computer network security / Mandatory access control / Cloud computing / Database / Middleware / Principle of least privilege / Industry Foundation Classes / Security / Computer security / Computing

1 Investigating the Potential of Information Flow Control as a Cloud Security Technology Jean Bacon, Fellow, IEEE, Thomas Pasquier, Member, IEEE, Jatinder Singh, Member, IEEE, Olivier Hermant and David Eyers, Member, IE

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:44:42
54Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-08-01 20:48:11
55Linux kernel / PaX / Linux / Address space layout randomization / Grsecurity / Kernel / RSBAC / Mandatory access control / Loadable kernel module / Computer security / Software / System software

PaX Introduction PaX: Twelve Years of Securing Linux PaX Team

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-10-10 09:42:52
56Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-04-29 08:46:04
57Java applet / Java platform / Java programming language / Mandatory access control / Sandbox / JavaScript / Asbestos / Computing / System software / Software

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRAugust 6, 2007

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-11-10 16:49:33
58Cross-platform software / JavaScript / Cross-site scripting / Application security / Malware / Mandatory access control / World Wide Web / Computer security / Security / Computing

Improving Web Site Security with Data Flow Management by Alexander Siumann Yip S.B., Computer Science and Engineering (2001)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-26 16:18:37
59Mandatory access control / HTTP cookie / Access control / Form / Database / JavaScript / Web application framework / Google Chrome / HTML / Computing / Software / Database management systems

Hails: Protecting Data Privacy in Untrusted Web Applications Daniel B. Giffin, Amit Levy, Deian Stefan David Terei, David Mazi`eres, John C. Mitchell Stanford Abstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-09-18 17:27:27
60Crime prevention / National security / Database management systems / Role-based access control / Mandatory access control / Principle of least privilege / Label / Database / Internet privacy / Security / Computer security / Access control

An Enhanced IFC Label Model to meet Application Policy Requirements. Thomas F. J.-M. Pasquier1 , Olivier Hermant2 , Jean Bacon1 1 University of Cambridge, United Kingdom,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:49:17
UPDATE