Multilevel security

Results: 163



#Item
81Computer storage / Shared resource / File system / Computer file / Information security / NTFS / Distributed file system / Multilevel security / Email / Computing / Microsoft Windows / Network file systems

Laissez-faire file sharing Access control designed for individuals at the endpoints Maritza L. Johnson Steven M. Bellovin

Add to Reading List

Source URL: www.robreeder.com

Language: English - Date: 2010-01-20 00:18:13
82Virtual machines / Multilevel security / Virtualization / Virtuality / Trusted Computing Group / Ring / Hypervisor / Virtual private network / Intel vPro / System software / Computing / Software

Secure Virtualization: Today’s Reality Secure virtualization is an exciting new technology that allows you to secure your computing systems, networks, and data while simultaneously remaining connected to trusted and un

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:56
83Computing / Computer network security / Human rights / Privacy / WS-Security / Vulnerability / WS-Federation / Multilevel security / Security Assertion Markup Language / Computer security / Security / Identity management

Microsoft PowerPoint - 7- MITA Security Privacy.ppt

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2014-11-06 14:13:00
84Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
85Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
86Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Proceedings Template - WORD

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:22:00
87Database management systems / Role-based access control / Authorization / PERMIS / Multilevel security / Separation of duties / User / Access Control Matrix / Operating system / Computer security / Security / Access control

A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL[removed]removed]

Add to Reading List

Source URL: www-engr.sjsu.edu

Language: English - Date: 2004-11-18 00:59:57
88Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
89Quality assurance / United States government secrecy / Computer security / Government / National Industrial Security Program / Certification and Accreditation / Information security / Multilevel security / Accreditation / Security / Data security / National security

Defense Security Service Industrial Security Field Operations Office of the Designated Approving Authority Manual for the Certification and Accreditation of Classified

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-28 13:58:20
90National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2012-01-11 13:39:10
UPDATE