Multilevel security

Results: 163



#Item
31Internet / SIPRNet / Kerberos / Password / Computer network / Multilevel security / Email / Information security / Network security / Computing / Computer network security / Security

An Architecture for Flexible Multi-Security Domain Networks Tim Gibson, Ph.D. * Lieutenant Colonel, U.S. Army United States Pacific Command Camp Smith, HI 96861

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:18:17
32Business software / Microsoft Dynamics CRM / Accounting software / Microsoft Dynamics / Multiple listing service / Customer relationship management / Microsoft / Microsoft Dynamics ERP / Multilevel security / Business / Marketing / Information technology management

Case Study: One of the Nation’s Largest MLS Providers Uses Altico’s Relationship Management Solution and Microsoft Dynamics CRM to Manage their Complex Subscriptions and Business Activity es as well as their broker a

Add to Reading List

Source URL: www.alticoadvisors.com

Language: English - Date: 2013-06-27 14:51:17
33Disk formatting / OS/2 / Computer security / Backup / RAID / Hard disk drive / Multilevel security / Access control / Security / Computing / Computer hardware

CONFIGURING STORAGE-AREA NETWORKS FOR MANDATORY SECURITY Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart Computer Science Department University College Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:09:49
34Asbestos / Mandatory access control / Multilevel security / Kernel / Process management / Server / Operating system / EROS / Principle of least privilege / Computer security / Computing / Computer architecture

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
35Computer security / Center for Army Analysis / Server / Public safety / Department of Defense Cyber Crime Center / XTS-400 / Security / Computer network security / Multilevel security

CASE STUDY Center for Army Analysis (CAA) Customer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
36Cloud storage / Data center / Data management / Distributed data storage / Networks / Multilevel security / Computer security / Computer network / Data loss / Computing / Concurrent computing / Distributed computing

Small Format Guard™ Commercial Providing Secure, Automated, High Performance Data Transfer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
37Centralized computing / Desktop virtualization / Computer network security / Thin client / Load balancing / Sun Secure Global Desktop / Computer network / Computing / Remote desktop / System software

Trusted Thin Client® Distribution Console Spanning Expanding secure multilevel access to geographically separate enterprise data centers. Trusted Thin Client® from Raytheon is an accredited

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
38Electronics / MPEG / Live /  virtual /  and constructive / Military technology / Military terminology / Distributed computing architecture / Multilevel security / High-level architecture / Computer security / Modeling and simulation / Computing / Technology

SimShield™ Bi-Directional Fixed-Format Data Filtering and Disguise. Secure Information Sharing for

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
39United States Department of Defense / Certification and Accreditation / Multiple Independent Levels of Security / System Security Authorization Agreement / National Security Agency / Department of Defense Information Technology Security Certification and Accreditation Process / Accreditation / Multiple single-level / Computer security / Quality assurance / Multilevel security

The Challenge of Multilevel Security Rick Smith, Ph.D., CISSP http://www.cryptosmith.com/ October 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
40Security / Military terminology / Distributed computing architecture / Simulation / Knowledge / Information security / Scientific modelling / Interoperability / Multilevel security / Modeling and simulation / Computing / Operations research

Security in Simulation – A Step in the Right Direction Stella Croom-Johnson – Dstl, UK Wim Huiskamp – TNO, The Netherlands Björn Möller - Pitch Technologies, Sweden

Add to Reading List

Source URL: www.pitch.se

Language: English - Date: 2013-10-21 07:29:19
UPDATE