Search

Your search keyword '"Multilevel security"' showing total 34 results

Search Constraints

Start Over You searched for: Descriptor "Multilevel security" Remove constraint Descriptor: "Multilevel security" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
34 results on '"Multilevel security"'

Search Results

1. A novel smart multilevel security approach for secure data outsourcing in crisis

2. Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack.

3. Multilevel Database Security for Android Using Fast Encryption Methods

4. A new secure 2PL real-time concurrency control algorithm (ES2PL)

5. Enforcing Multilevel Security Policies in Unstable Networks.

6. A new secure 2PL real-time concurrency control algorithm (ES2PL).

7. Gate-Level Information Flow Tracking for Security Lattices

8. Multilevel secure access control policy for distributed systems

9. The Advanced Port-in-Use Covert Channel Attack.

10. A Multilevel Access Control Scheme for Data Security in Transparent Computing.

11. Representation model of structured document for multilevel security

12. Study on enhancing integrity for BLP model

13. A novel smart multilevel security approach for secure data outsourcing in crisis.

14. Generating optimized gate level information flow tracking logic for enforcing multilevel security.

15. A policy integration method based on multilevel security for data integration.

16. Secured Workstation to Process the Data of Different Classification Levels

17. Implementation and performance analysis of multilevel security system in pervasive computing environment.

18. Improved multilevel security with latent semantic indexing

19. Multilevel secure data stream processing: Architecture and implementation.

20. Secured Workstation to Process the Data of Different Classification Levels.

21. A Classification Label Addition and Management Scheme for Binary Documents.

22. A Logical Specification and Analysis for SELinux MLS Policy.

23. CAMAC: A Context-Aware Mandatory Access Control Model.

24. Integrated criteria for covert channel auditing.

25. Multilevel security: reprise.

26. The Freeze algorithms for concurrency control in secure real-time database systems

27. Flexible Transaction Dependencies in Database Systems.

28. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels.

29. Modeling Security-Relevant Data Semantics.

30. The SeaView Security Model.

31. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.

32. Extending the Noninterference Version of MLS for SAT.

33. Views for Multilevel Database Security.

34. Time and Probability-Based Information Flow Analysis.

Catalog

Books, media, physical & digital resources