XTS-400

Results: 51



#Item
1Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
2Multilevel security / Secure state / Multics / Ring / Operating system / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

rim NRL Report 8806 :f. rr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:49
3Distributed computing architecture / MongoDB / NoSQL / Structured storage / Trusted Computing / Serialization / Multilevel security / XTS-400 / Data management / Computing / Computer security

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
4Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
5Beckhoff / Regenerative brake / EtherCAT / Automation / Linear / Control theory / XTS-400 / Technology / Energy / Engineering

CEE Nov12 Edn_Features.qxd

Add to Reading List

Source URL: download.beckhoff.com

Language: English - Date: 2012-11-02 12:07:56
6Computer security / Center for Army Analysis / Server / Public safety / Department of Defense Cyber Crime Center / XTS-400 / Security / Computer network security / Multilevel security

CASE STUDY Center for Army Analysis (CAA) Customer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
7Server / Server hardware / File Transfer Protocol / Computer network security / Windows Server / XTS-400 / Computing / Internet / Network architecture

Trusted Gateway System™ Secure Multi-Directional Data Transfer. Features and Benefits n Included

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
8Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
9Common Criteria / Computer network security / Crime prevention / National security / Action / Protection Profile / Decomposition / XTS-400 / Computer security / Evaluation / Security

Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 1999

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
10Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
UPDATE