<--- Back to Details
First PageDocument Content
System software / Malware / Sandbox / Application security / Mandatory Integrity Control / Mandatory access control / Internet security / Windows Vista / Spyware / Computer network security / Computer security / Security
Date: 2013-02-05 23:03:43
System software
Malware
Sandbox
Application security
Mandatory Integrity Control
Mandatory access control
Internet security
Windows Vista
Spyware
Computer network security
Computer security
Security

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Download Document from Source Website

File Size: 326,05 KB

Share Document on Facebook

Similar Documents

Mandatory access control / Bell–LaPadula model / Biba Model / LOMAC / Integrity / Portable Document Format / File system / Computer security / Computing / Mandatory Integrity Control

DAC vs. MAC Bell-Lapadula model • Most people familiar with discretionary access control (DAC)

DocID: 1fuvr - View Document

Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

DocID: 1ftXw - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 15AiT - View Document

Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

DocID: 14Ysl - View Document

Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

DocID: 141br - View Document