Search

Your search keyword '"Multilevel security"' showing total 534 results

Search Constraints

Start Over You searched for: Descriptor "Multilevel security" Remove constraint Descriptor: "Multilevel security"
534 results on '"Multilevel security"'

Search Results

1. A novel smart multilevel security approach for secure data outsourcing in crisis

2. Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack.

3. Multilevel Database Security for Android Using Fast Encryption Methods

4. A new secure 2PL real-time concurrency control algorithm (ES2PL)

5. Enforcing Multilevel Security Policies in Unstable Networks.

6. A new secure 2PL real-time concurrency control algorithm (ES2PL).

7. The Port-in-Use Covert Channel Attack

8. Gate-Level Information Flow Tracking for Security Lattices

9. Multilevel secure access control policy for distributed systems

12. Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems

14. Information Flow Graph: An Approach to Identifying Covert Storage Channels

15. Multilevel Secure Data Stream Processing

16. The Instance-Based Multilevel Security Model

17. The Advanced Port-in-Use Covert Channel Attack.

18. Improved Bell–LaPadula Model With Break the Glass Mechanism

19. Secure Transaction Management Protocols for MLS/DDBMS

20. MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking

24. A Multilevel Access Control Scheme for Data Security in Transparent Computing.

27. MeXT-SE: A Design Tool to Transparently Generate Secure MPSoC

28. A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks

29. Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System

30. Representation model of structured document for multilevel security

41. Study on enhancing integrity for BLP model

47. Multilevel Security Biometric Authentication Locking System Using Arduino UNO

48. A novel smart multilevel security approach for secure data outsourcing in crisis.

49. Generating optimized gate level information flow tracking logic for enforcing multilevel security.

Catalog

Books, media, physical & digital resources