<--- Back to Details
First PageDocument Content
System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing
Date: 2006-11-30 16:47:48
System software
Access token
Computer security
Windows Vista
Thread
Process
Kernel
Concurrency control
Mandatory Integrity Control
Microsoft Windows
Computing
Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Download Document from Source Website

File Size: 125,50 KB

Share Document on Facebook

Similar Documents

Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DocID: 1fuvr - View Document

Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

DocID: 1ftXw - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 15AiT - View Document

Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

DocID: 14Ysl - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 141br - View Document