DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Multilevel security
Multilevel security
NSA Security-Enhanced Linux (Selinux)
An Access Control Model for Preventing Virtual Machine Escape Attack
Multilevel Security (MLS)
Multilevel Adaptive Security System
Looking Back: Addendum
A Logical Specification and Analysis for Selinux MLS Policy
Oracle Solaris Secure
Security Pattern Validation and Recognition
In Guards We Trust: Security and Privacy in Operating Systems Revisited
Controlled Environment to Run Untrusted Applications
Flexible and Fine-Grained Mandatory Access Control on Android For
Toward Multiple Level Security Cloud with Strong Hardware Level Isolation
5G Security & Privacy
The Legacy of Multics and Secure Operating Systems Today
Computer Security
Use of Openssh Support for Remote Login to a Multilevel Secure System
Planning for Multilevel Security and the Common Criteria
XTS-400 UK EAL5 Security Target - XTS-400 Version 6.4(UKE)
Top View
Virtualization in Multilevel Security Enviroments
Multilevel Security in Tightly Coupled Military Systems: Virtualization As a Path to MLS by Diana L
Using Pitbull® Trusted Computing Platform to Solve Real-World Problems Presentation Outline 1
CS5460: Operating Systems
GENERAL DYNAMICS MISSION SYSTEMS CONFIDENCE in Your Digital World
High Assurance Testbed for Multilevel Interoperability 2004 Developments
Mandatory Access Control
Case Study: Solaris Trusted Extensions Glenn Faden and Christoph Schuba, Sun Microsystems, Inc
Assessment of Access Control Systems
Pitbull and Selinux Mandatory Access Control Systems
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Multilevel Security
An Analysis of Three Kernel-Based Multilevel Security Architectures
Multilevel Classification in Selinux
AR 380 19 Information Systems Security
The Future of Multi-Level Secure (MLS) Information Systems
Multilevel Security
Multilevel Multifactor Single Sign-On
A Comparative Study of Security Features in Freebsd and Openbsd
Mandatory Access Control
A Guide to Understanding Security Modeling in Trusted Systems As Part of the “Rainbow Series” of Documents Produced by Our Technical Guidelines Program
Cost Profile of a Highly Assured, Secure Operating System
Design and Implementation of Multilevel Security Architectures
A Model Driven Method for Multilevel Security Systems Design
A Survey of Security Concepts for Common Operating Environments
The Design and Implementation of the Freebsd® Operating System
Security Kernels
Multilevel Multifactor Single Sign-On