Multilevel security

Results: 163



#Item
121Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Microsoft Word - CC Part 1

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-09-12 11:00:36
122Computing / Computer network security / Human rights / Privacy / WS-Security / Vulnerability / WS-Federation / Multilevel security / Security Assertion Markup Language / Computer security / Security / Identity management

Microsoft PowerPoint - 7- MITA Security Privacy.ppt

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-08-07 15:53:31
123Computing / Crime prevention / National security / Data security / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Network security / Access control / Computer security / Security / Computer network security

Network Security Reference Guide

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-30 14:52:02
124Military terminology / Command and control / NetOps / NCOW / Network-centric warfare / Multilevel security / Global Information Grid / Information Assurance Technology Analysis Center / Defense Information Systems Agency / Net-centric / Military / United States Department of Defense

DOC Document

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2012-03-09 09:53:36
125Crime prevention / National security / Electronic commerce / Secure communication / Ring / Operating system / Trusted path / Multilevel security / Trusted system / Computer security / Security / Computer network security

The Trusted Function in Secure Decentralized Processing

Add to Reading List

Source URL: pt.withington.org

Language: English - Date: 2003-03-19 14:04:01
126Crime prevention / Surveillance / Human rights / Law enforcement / Telecommunications data retention / Human security / Biometrics / Closed-circuit television / Privacy / Security / National security / Public safety

Surveillance and security technologies A multilevel approach to ethical and societal implications 26th Meeting of the European Group on Ethics in Science and new Technologies (EGE) Brussels, 16 April 2013

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-04-25 03:55:03
127Trusted Computer System Evaluation Criteria / Common Criteria / Kernel / Evaluation Assurance Level / Ring / Shared resource / XTS-400 / Mandatory access control / Computer security / Evaluation / Multilevel security

High Assurance MLS File Service

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
128Remote desktop / Multilevel security / Thin client / Citrix Systems / NIPRNet / X Window System / Filesystem in Userspace / Trusted Computer System Evaluation Criteria / Multiple single-level / Software / Computer security / Computing

MLS Trusted Workstations for Rapid Deployment

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-07-09 16:46:01
129Computer security / Multilevel security / Security / Computer network security / Integrity

GemSealâ„¢ Guard High Assurance Integrity for Management & Control Class A1 crypto seal guards can enable high integrity Management and Control (M&C) of critical systems across untrusted, even Internet, infrastructure.

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
130Industrial automation / SCADA / Telemetry / Security / Integrity / Computer security / Multilevel security / Technology / Ethics / Evaluation

High Assurance MLS File Service

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
UPDATE