First Page | Document Content | |
---|---|---|
![]() Date: 2010-09-02 21:29:55Access control HP-UX System V Role-based access control Discretionary access control Mandatory access control Common Criteria PERMIS Operating system Computer security Security Evaluation | Add to Reading List |
![]() | Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli StudiDocID: 1unUe - View Document |
![]() | Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!DocID: 1t0cX - View Document |
![]() | The Case for Abstracting Security PoliciesDocID: 1qQWS - View Document |
![]() | High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer GuildDocID: 1qsUu - View Document |
![]() | fig-capsicum-processes.graffleDocID: 1pYGG - View Document |