Mandatory Integrity Control

Results: 28



#Item
1DAC vs. MAC  Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
2Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
3Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
4Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-08-01 20:48:11
5Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-04-29 08:46:04
6Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
7Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
8Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract) Limin Jia1 , Jassim Aljuraidan1 , Elli Fragkaki1 , Lujo Bauer1 , Michael Stroucken1 , Kazuhide Fukushima2 , Shinsaku Kiyomoto2 , and Yuta

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-07-16 21:28:14
9Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Run-Time Enforcement of InformationFlow Properties on Android Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake July 23, 2012 (Revised December 7, 2012)

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-06-10 12:47:45
10BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55