First Page | Document Content | |
---|---|---|
![]() Date: 2013-11-20 12:11:33Access control Mandatory access control Information security Security controls XACML Role-based access control Health Insurance Portability and Accountability Act Security policy Trusted Computer System Evaluation Criteria Security Computer security Data security | Add to Reading List |
![]() | Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli StudiDocID: 1unUe - View Document |
![]() | Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!DocID: 1t0cX - View Document |
![]() | The Case for Abstracting Security PoliciesDocID: 1qQWS - View Document |
![]() | High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer GuildDocID: 1qsUu - View Document |
![]() | fig-capsicum-processes.graffleDocID: 1pYGG - View Document |