First Page | Document Content | |
---|---|---|
![]() Date: 2012-03-26 14:41:48Software Database management systems Intrusion detection system Secure communication Electronic commerce Multilevel security Mandatory access control XTS-400 Snort Computer security Computer network security System software | Add to Reading List |
![]() | The Case for Abstracting Security PoliciesDocID: 1qQWS - View Document |
![]() | rim NRL Report 8806 :f. rrDocID: 1a4eo - View Document |
![]() | FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1DocID: 19rum - View Document |
![]() | A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; thaDocID: 198TO - View Document |
![]() | CEE Nov12 Edn_Features.qxdDocID: 16YQT - View Document |