<--- Back to Details
First PageDocument Content
Computer network security / Crime prevention / National security / Multilevel security / Information security / Mandatory access control / Trusted Computer System Evaluation Criteria / Security token / Ring / Computer security / Security / Computing
Date: 1998-10-28 00:00:00
Computer network security
Crime prevention
National security
Multilevel security
Information security
Mandatory access control
Trusted Computer System Evaluation Criteria
Security token
Ring
Computer security
Security
Computing

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 60,35 KB

Share Document on Facebook

Similar Documents

Improving Android security by widening the role of Mandatory Access Control Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi {enrico.bacis, simone.mutti, marco.rosa, parabosc} @unibg.it Università degli Studi

DocID: 1unUe - View Document

Mandatory Access Control Sarah Newman https://prgmr.com/~srn/mac_apparmor.pdf Pop Quiz!

DocID: 1t0cX - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

DocID: 1qsUu - View Document

Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

DocID: 1pYGG - View Document