Mandatory access control

Results: 211



#Item
61Database management systems / Cloud computing / Database / Mandatory access control / Role-based access control / Stream processing / Industry Foundation Classes / Security / Computing / Access control

An Information Flow Control Model for the Cloud Thomas F. J.-M. Pasquier, Jatinder Singh and Jean Bacon Olivier Hermant Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-02-19 09:07:45
62Data management / Cross-platform software / Oracle Database / Oracle Internet Directory / Oracle Corporation / PL/SQL / Oracle Enterprise Manager / Oracle Forms / Mandatory access control / Software / Computing / Relational database management systems

Oracle Label Security Administrator’s Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-05 02:07:00
63Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
64Interoperability / Organisation-based access control / XACML / Trust / Computer security / Computing / Mandatory access control

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Description of models for the

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-09-16 06:00:41
65International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
66Crime prevention / National security / Information flow / Information theory / Computer network security / Information security / Covert channel / Bell–LaPadula model / Mandatory access control / Security / Computer security / Public safety

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-01-07 13:58:19
67Inter-process communication / RSBAC / Procfs / Mandatory access control / Kernel / FIFO / Named pipe / System call / System software / Computer architecture / Computer security

The ‘Rule Set Based Access Control’ (RSBAC) Framework for Linux Simone Fischer-Hübner Karlstad University Department of Computer Science SE[removed]Karlstad / Sweden Email: [removed]

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
68RSBAC / Linux kernel / Mandatory access control / Loadable kernel module / Architecture of Windows NT / Kernel / Operating system / Procfs / Access control / System software / Software / Computer architecture

COVER STORY RSBAC Architecture of Rule Set Based Access Control (RSBAC)

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
69Access control / RSBAC / Mandatory access control / FIFO / Kernel / Linux kernel / Access control list / Capability-based security / Unix / Computer security / System software / Security

Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Short Overview for OpenWeekend 2002 in Prague Contents II: 3 Implemented Models

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
70Unix / RSBAC / Access control / File system / Kernel / Linux kernel / Filesystem Hierarchy Standard / Malware / Mandatory access control / System software / Software / Computing

3 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
UPDATE