Multilevel security

Results: 163



#Item
51Crime prevention / National security / Software engineering / Computer security / Electronic commerce / Secure communication / Common Object Request Broker Architecture / Password / Multilevel security / Computing / Security / Computer network security

A New Model of Security for Metasystems ? Steve J. Chapin, Chenxi Wang, William A. Wulf, Fritz Knabe, and Andrew Grimshaw Department of Computer Science, University of Virginia, Charlottesville, VA 22903{2442, fchapin,cw

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1999-09-01 15:39:58
52International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
53Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
54Evaluation Assurance Level / Security Target / Protection Profile / Common Criteria / Integrity / Multilevel security / Computer security / Evaluation / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-020 CR Certification Report Issue[removed]December[removed]Toshiba T6ND4 HW version 5

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:34
55Earth / Food politics / Rice / El Niño-Southern Oscillation / Agriculture / Famine / Wetland / Food security / Cassava / Atmospheric sciences / Food and drink / Tropical agriculture

Multilevel Impact Assessment and Coping Strategies against El Nino: Case of Food Crops in Indonesia Bambang Irawan*

Add to Reading List

Source URL: www.uncapsa.org

Language: English - Date: 2006-09-08 01:04:56
56Computer network security / Virtualization / Operating system / Hypervisor / Computer security / Server / Distributed computing / Multilevel security / Active Directory / System software / Computing / Security

Trusted Passages: Managing Distributed Trust Needs of Emerging Applications Mustaque Ahamad, Martim Carbone, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne, Karsten Schwan and Ramesh Viswanath School of Computer S

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-23 15:32:15
57Common Criteria / Security Target / Protection Profile / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2006

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
58Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Microsoft Word - CC Part 1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2012-09-27 10:39:45
59Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model July 2009

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
60Computer network security / Multiple Independent Levels of Security / Security / Malware / Vulnerability / Separation kernel / IPsec / Integrity / Virtual private network / Computer security / Computing / Cyberwarfare

SN-052-Multilevel-Prospekt_0413_V4.indd

Add to Reading List

Source URL: www.secunet.com

Language: English - Date: 2013-07-16 06:35:47
UPDATE