Mandatory access control

Results: 211



#Item
71Access control / RSBAC / C++ classes / Role-based access control / Objective-C / Constructor / File system / Mandatory access control / Computing / Object-oriented programming / Software engineering

The Role Compatibility Security Model Paper for the Nordic Workshop on Secure IT Systems (NordSec[removed]Amon Ott Compuniverse Email: [removed], WWW: http://www.rsbac.org October 22, 2002

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
72Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
73Linux kernel / RSBAC / Linux Security Modules / Access control / Mandatory access control / FLASK / Type enforcement / Grsecurity / PaX / Computer security / System software / Software

RSBAC - a framework for enhanced Linux system security Marek Jawurek∗ RWTH-Aachen Abstract Operating systems traditionally bring their own means of protection against any kind of threats. But often the system’s secur

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
74Crime prevention / National security / Evaluation / Trusted Computer System Evaluation Criteria / Mandatory access control / ITSEC / Common Criteria / CTCPEC / Information security / Computer security / Security / Data security

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00
75EnGarde Secure Linux / Security-Enhanced Linux / Linux / Hardening / Mandatory access control / Security-focused operating system / Computer security / Software / Computing

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux (ABSTRACT) ABSTRACT 1. What is EnGarde Secure Linux? EnGarde Secure Linux is not just another "repackaged" Linux distribution, but a modern open source

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 09:03:34
76EnGarde Secure Linux / Security-Enhanced Linux / Computer network security / F-Secure / Secure Shell / Secure Computing / Operating system / Vulnerability / Mandatory access control / Computer security / System software / Software

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux 1. Introduction to Guardian Digital and EnGarde Secure Linux 1.1. Pioneering Open Source Security in an Insecure World Since its inception in 1999, Guar

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 08:56:01
77National Security Agency / Security-Enhanced Linux / Mandatory access control / Access control / Linux Security Modules / Extended file attributes / Linux kernel / Fedora / Debian / Software / System software / Computer security

SELinux Quick Start Guide SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-01-03 14:54:00
78Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:18
79Simplified Mandatory Access Control Kernel / Installation software / Mandatory access control / Kernel / Installer / Thread / System software / Computer security / Software

Security model for embedded systems using Smack *

Add to Reading List

Source URL: archive.fosdem.org

Language: English - Date: 2014-10-24 07:45:55
80Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:20
UPDATE