Multilevel security

Results: 163



#Item
61Relational database management systems / Database theory / Data / Statistical models / Relational database / Relational model / SQL / Database / Microsoft SQL Server / Database management systems / Data management / Computing

Multilevel Security for Relational Databases Osama S. Faragallah El-Sayed M. El-Rabaie • Fathi E. Abd El-Samie

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2015-02-10 15:23:47
62Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:18
63Real-time operating systems / Trusted computing base / Embedded operating systems / Microkernel / L4 microkernel family / Evaluation / Multiple Independent Levels of Security / Multilevel security / Kernel / Computer architecture / Computer security / Computing

Trustworthy Embedded Systems http://www.ertos.nicta.com.au/ Trustworthy Embedded Systems ERTOS-2 Project Plan 2009–2013 [removed]

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:09:39
64Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:20
65Multilevel security / Bell–LaPadula model / Type enforcement / Access control / Computer file / Computer security / Security / Mandatory access control

Chapter 8 Mandatory Access Control With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-03-31 12:46:41
66Crime prevention / Computer security / Computer network security / Trusted computing base / Password / Information security / Multilevel security / Physical security / Vulnerability / Security / Public safety / National security

Microsoft Word - Lampson - Security paper for IEEE Computer.doc

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2004-03-01 01:00:42
67Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / Multilevel security / Computer security / Evaluation / Security

Microsoft Word - CC Part 1

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2012-10-15 09:31:24
68Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 00:20:20
69Public safety / Electronic commerce / Cybernetics / Systems theory / Computer security / Information security / Multilevel security / Software engineering / System / Security / Crime prevention / National security

PANEL STATEMENT Nontechnical Issues in Achieving Dependably Secure Systems and Networks National Information Systems Security Conference, Crystal City, Virginia, 18-21 October 1999 Chairman: Peter G. Neumann, Computer Sc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
70Computer network security / Crime prevention / National security / Multilevel security / Trusted computing / XTS-400 / Mandatory access control / Multiple single-level / Cloud computing / Computer security / Computing / Security

Microsoft Word - MYSEA-MILCOM10-Final.docx

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:52:58
UPDATE