Multilevel security

Results: 163



#Item
41Tamper-evident / Brand / Tamper resistance / Online shopping / Business / Brand management / Multilevel security / Security / Packaging / Technology

PDF Document

Add to Reading List

Source URL: www.tesa-scribos.com

Language: English - Date: 2015-05-30 11:03:38
42National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
43Internet protocols / Computer network security / Network performance / Transmission Control Protocol / Port / Traffic flow / Netflow / Traffic classification / Transport layer / Computing / Data / Network architecture

BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis Konstantina Papagiannaki

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-20 08:07:35
44Tamper-evident / Brand / Tamper resistance / Online shopping / Business / Brand management / Multilevel security / Security / Packaging / Technology

Infografik-Checklist02-ENG

Add to Reading List

Source URL: www.tesa-scribos.com

Language: English - Date: 2015-05-26 00:27:06
45Computing / Automation / Building automation / Industrial Ethernet / Modbus / File Transfer Protocol / Multilevel security / SCADA / Secure Shell / Technology / Security / Access control

Owl Enterprise Perimeter Defense Solution (EPDS) Owl Enterprise Perimeter Defense Solution The Owl Electronic Perimeter Defense Solution (EPDS) maintains process control network isolation while enabling critical informa

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2014-11-04 10:12:06
46Computing / VxWorks / Multilevel security / Multiple Independent Levels of Security / Operating system / AdaCore / Virtual machine / Hyper-V / Board support package / System software / Software / Real-time operating systems

WIND RIVER VXWORKS MILS PLATFORM 3.0, MULTI-CORE EDITION TABLE OF CONTENTS Run-Time Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Separation K

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:14
47Computer network security / Crime prevention / National security / Secure communication / Vulnerability / Threat / Multilevel security / Computer security / Security / Cyberwarfare

Security  Basics   Ruby  B.  Lee   Princeton  University   HotChips  Security  Tutorial   August  10  2014  

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:55:58
48Virtual machines / Real-time operating systems / Embedded operating systems / VxWorks / Multiple Independent Levels of Security / Multilevel security / Embedded systems / Wind River Systems / Simics / System software / Software / Computing

WIND RIVER VXWORKS MILS PLATFORM The world’s most critical defense, networking, and industrial infrastructure requires high assurance of security along with protection from intentional threats and inadvertent errors. I

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:12
49Virtual machines / Real-time operating systems / VxWorks / Multiple Independent Levels of Security / Embedded systems / Multilevel security / Simics / Operating system / Board support package / System software / Software / Computing

WIND RIVER VXWORKS MILS PLATFORM[removed]TABLE OF CONTENTS Run-Time Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Separation Kernel . . . . .

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:14
50National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
UPDATE