Multilevel security

Results: 163



#Item
21Distributed computing architecture / MongoDB / NoSQL / Structured storage / Trusted Computing / Serialization / Multilevel security / XTS-400 / Data management / Computing / Computer security

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
22Database management systems / Multilevel security / Data management / Security / Replication / Database / Ring / Data dictionary / Operating system / Computer security / Computing / Data

A Practical Approach to High Assurance Multilevel Secure Computing Service To appear, Proc.10th Annual

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:27
23Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
24Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:00
25Computer storage / Disk formatting / OS/2 / Hard disk drive / Backup / Computer security / Logical volume management / Multilevel security / Computing / Computer hardware / Security

Configuring Storage Area Networks Using Mandatory Security Benjamin Aziz≀∗ Simon N. Foley†

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2008-09-03 07:48:21
26Programming language implementation / VM / Insider / Zoning / Multilevel security / System software / Software / Virtual machines

Limiting Insider Effects Through Micro-Zoning Fred Cohen – CEO – Management Analytics Abstract—This paper focuses on the use of micro-zoning to limit the effects of insider acts. Background is provided on component

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-08-02 22:42:50
27Role-based access control / Security-Enhanced Linux / PERMIS / Filesystem permissions / Multilevel security / Delegation in IT / AGDLP / Computer security / Security / Access control

Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 04:53:26
28Network flow / Computer network security / Crime prevention / Electronic commerce / National security / Flow network / Vulnerability / Multilevel security / Constraint satisfaction / Computer security / Security / Cyberwarfare

A Soft Constraint-based Approach to the Cascade Vulnerability Problem Stefano Bistarelli Istituto di Informatica e Telematica, CNR, Pisa, Italy

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:39
29Computer network security / Multilevel security / Semiring / Vulnerability / Information flow / Software assurance / Threat / National Security Agency / Computer security / Security / Cyberwarfare

Multilevel Security and Quality of Protection Simon N. Foley1 , Stefano Bistarelli3,4 , Barry O’Sullivan1,2 , John Herbert1 , and Garret Swart5 1 Department of Computer Science, University College, Cork, Ireland.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-08-29 06:47:44
30Crime prevention / National security / Computer security / Human communication / Usability / Information security / Password / Multilevel security / Public key infrastructure / Security / Human–computer interaction / Cyberwarfare

Humans in the loop: Human-computer interaction and security - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:14
UPDATE