Mandatory access control

Results: 211



#Item
1Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it  Università degli Studi

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

Add to Reading List

Source URL: tinytocs.ece.utexas.edu

Language: English - Date: 2016-03-05 17:06:25
    2Mandatory Access Control Sarah Newman  https://prgmr.com/~srn/mac_apparmor.pdf  Pop Quiz!

    Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

    Add to Reading List

    Source URL: www.svlug.org

    - Date: 2016-11-03 13:38:18
      3The Case for Abstracting Security Policies    

      The Case for Abstracting Security Policies   

      Add to Reading List

      Source URL: rich.recoil.org

      Language: English - Date: 2006-04-13 14:58:02
      4High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

      High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:31
      5fig-capsicum-processes.graffle

      fig-capsicum-processes.graffle

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-03-09 05:43:31
      6Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

      Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

      Add to Reading List

      Source URL: www.inguardians.com

      Language: English - Date: 2016-08-05 14:35:56
      7Intentional Access Management: Making Access Control Usable for End-Users

      Intentional Access Management: Making Access Control Usable for End-Users

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-13 14:38:51
      8Wooster: Mandatory Access Control for Rails  Julian Bangert, Alexander Lin, Julia Huang    Abstract    We introduce Wooster, a system for enforcing flexible mandatory access control policies 

      Wooster: Mandatory Access Control for Rails  Julian Bangert, Alexander Lin, Julia Huang    Abstract    We introduce Wooster, a system for enforcing flexible mandatory access control policies 

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:49:57
        9Hardened kernels for everyone Yves-Alexis Perez Kernel Recipes 2015

        Hardened kernels for everyone Yves-Alexis Perez Kernel Recipes 2015

        Add to Reading List

        Source URL: perso.corsac.net

        Language: English
        10CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§  Nacho Navarro∗

        CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§ Nacho Navarro∗

        Add to Reading List

        Source URL: www.mulix.org

        Language: English - Date: 2016-06-16 09:04:37