Search

Your search keyword '"Mandatory access control"' showing total 414 results

Search Constraints

Start Over You searched for: Descriptor "Mandatory access control" Remove constraint Descriptor: "Mandatory access control" Language undetermined Remove constraint Language: undetermined
414 results on '"Mandatory access control"'

Search Results

1. Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models

2. Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism

3. SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization

4. iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone

5. THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS

6. A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

7. Examining Security for Different Data Models*

8. A service-based RBAC & MAC approach incorporated into the FHIR standard

9. Domain Isolation in FPGA-Accelerated Cloud and Data Center Applications

10. The Concept of Allocating Access Rights to Virtual Memory Area in Linux-based Operating Systems

11. SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization

12. FPGA Accelerated Embedded System Security Through Hardware Isolation

13. AppArmor For Health Data Access Control: Assessing Risks and Benefits

14. CONVERSION OF DOMAIN TYPE ENFORCEMENT LANGUAGE TO THE JAVA SECURITY MANAGER

15. Ways of Unauthorized Access to Medical Data and Approach to Organize Secure Access using Blockchain Technology

16. Developing and Assessing an Educational Game for Teaching Access Control

17. Covert Channels of Data Communication

18. Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features

19. Privaros: A Framework for Privacy-Compliant Delivery Drones

20. An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare

21. Active Defense Technology of Power Monitoring System With Adaptive Features

22. Taming the Costs of Trustworthy Provenance through Policy Reduction

23. Hails: Protecting data privacy in untrusted web applications

24. vmOS: A virtualization-based, secure desktop system

25. AndroidBLP for Confidentiality Management in Android Environments

26. Current Research and Open Problems in Attribute-Based Access Control

27. Implementation of Mandatory Access Control in Distributed Systems

28. An E-ABAC-Based SDN Access Control Method

29. Towards Integrating Attribute-Based Access Control into Ontologies

30. A Light-weight Kernel-level Mandatory Access Control Framework for Android

31. Research of Access Control System Based on Attribute Encryption Technology that Suitable for Dispatching and Control Cloud

32. From Access Control Models to Access Control Metamodels: A Survey

33. Arbiter: a lightweight, secured and enhanced access control mechanism for cloud computing

34. Lightweight Information Flow

35. Effective Security and Access Control Framework for Multilevel Organizations

36. A Solution to 'Confused Deputy' Problem Using RWFM Labels

37. Real-time Mandatory Access Control on SELinux for Internet of Things

38. Kepatuhan Functional Requrements Hak Akses pada Electronic Records Management System Arteri

39. A protective mechanism for the access control system in the virtual domain

40. TripleMon: A multi-layer security framework for mediating inter-process communication on Android

41. Convergence Interaction for Communication

42. Mandatory Access Control for Android Application Security

43. Access Control Mechanism based on MAC for Cloud Convergence

44. Towards a secure and lightweight network function virtualisation environment

45. Attribute-Based Access Control in Web Applications

46. Android Escalation Paths

47. Inheriting Software Security Policies within Hardware IP Components

48. Ensuring Security in Cloud Computing Using Access Control: A Survey

49. An Historical Analysis of the SEAndroid Policy Evolution

50. Access Control Model for Modern Virtual e-Government Services: Saudi Arabian Case Study

Catalog

Books, media, physical & digital resources