Search

Your search keyword '"Mandatory access control"' showing total 576 results

Search Constraints

Start Over You searched for: Descriptor "Mandatory access control" Remove constraint Descriptor: "Mandatory access control"
576 results on '"Mandatory access control"'

Search Results

1. Automatic generation of AppArmor security policies based on large language models

2. Automatic generation of AppArmor security policies based on large language models

3. 基于大语言模型的AppArmor安全策略自动生成方法.

4. XFilter: An Extension of the Integrity Measurement Architecture Based on Fine-Grained Policies.

5. XFilter: An Extension of the Integrity Measurement Architecture Based on Fine-Grained Policies

6. The Port-in-Use Covert Channel Attack

7. Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy

8. Security Improvement of File System Filter Driver in Windows Embedded OS.

9. T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices

10. A flexible fine-grained dynamic access control approach for cloud computing environment.

11. UI Tags: Confidentiality in Office Open XML

12. A Lightweight Security Isolation Approach for Virtual Machines Deployment

14. Security of OS-Level Virtualization Technologies

15. Attacks on Android Clipboard

18. Software Security: A Formal Perspective : (Notes for a Talk)

19. Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems

21. A Self-Adaptive Bell–LaPadula Model Based on Model Training With Historical Access Logs.

24. A Context-Aware Mandatory Access Control Model for Multilevel Security Environments

25. Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models

26. Application Security – Myth Or Reality?

28. Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components

29. A Privacy Enhanced Role-Based Access Control Model for Enterprises

31. A Security Access Control Mechanism for a Multi-layer Heterogeneous Storage Structure

33. A Novel Approach to Role-Based Access Control

35. Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism

39. SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization

40. MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption

41. iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone

42. THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS

43. A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

45. Security Architecture

Catalog

Books, media, physical & digital resources