Multilevel security

Results: 163



#Item
141Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
142Steganography / Computer network security / NSD / Trusted Computer System Evaluation Criteria / Multilevel security / Bell–LaPadula model / Network security / Mediation / Overt channel / Computer security / Security / Covert channel

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
143Virtual machines / AS/400 / Hypervisor / Logical partition / Hyper-V / Virtualization / VM / Ring / Multilevel security / System software / Software / Power Architecture

RC23511 (W0502-006) February 2, 2005 Computer Science

Add to Reading List

Source URL: domino.watson.ibm.com

Language: English - Date: 2005-02-07 12:12:05
144Security / Bell–LaPadula model / Multilevel security / Information flow / Covert channel / VM / Risk / Mandatory access control / Hyper-V / System software / Computer security / Software

RC24154 (W0701-086) January 18, 2007 Computer Science

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2013-08-20 15:06:04
145Crime prevention / National security / Security-Enhanced Linux / Mandatory access control / Principle of least privilege / Multilevel security / Comparison of privilege authorization features / Type enforcement / Superuser / Computer security / Security / National Security Agency

Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-03-05 16:10:36
146Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
147Common Criteria / Security Target / Protection Profile / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:14:51
148National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
149Crime prevention / National security / National Security Agency / Security Target / Multilevel security / Mandatory access control / Security-Enhanced Linux / Common Criteria / Evaluation Assurance Level / Computer security / Security / Evaluation

[ST[removed]updatedBrS] Nexor Sentinel 3E Filtering System - Security Target - NEX2764ENG

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-02-04 05:54:42
150Multiple Independent Levels of Security / Multilevel security / Software engineering / Common Object Request Broker Architecture / Computer security / General Inter-ORB Protocol / Separation kernel / Kernel / Partitioning Communication System / CORBA / Computing / Security

The MILS Architecture for a Secure Global Information Grid Dr. W. Scott Harrison, Dr. Nadine Hanebutte, Dr. Paul W. Oman, and Dr. Jim Alves-Foss

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-04 23:48:42
UPDATE