Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Multilevel security 7 found (34 total)

alternate case: multilevel security

Carl Landwehr (852 words) [view diff] exact match in snippet view article find links to article

assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification
Solaris Trusted Extensions (416 words) [view diff] case mismatch in snippet view article find links to article
Mode Workstation 1.0 - ITSEC Certified for E3 / F-B1 1990 SunOS Multilevel Security 1.0 - TCSEC Conformance (1985 Orange Book) "Solaris Common Criteria
Xenix (3,131 words) [view diff] exact match in snippet view article find links to article
Information Systems. It incorporated the Bell–LaPadula model of multilevel security, and had a multilevel secure interface for the STU-III secure communications
Guard (information security) (1,189 words) [view diff] case mismatch in snippet view article
Guards Effectively Address the Problem? Rick Smith The Challenge of Multilevel Security, Blackhat, Oct 2003 "Nexor Sentinel 3E Filtering System Common Criteria
Reference monitor (567 words) [view diff] case mismatch in snippet view article find links to article
). New York, NY: John Wiley & Sons Publishing, Inc. Chapter 8, "Multilevel Security" Anderson, J. 'Computer Security Technology Planning Study', ESD-TR-73-51
Hierarchy (5,951 words) [view diff] exact match in snippet view article find links to article
Selim G.; Taylor, Peter D. (1983). Cryptographic solution to a multilevel security problem (PDF). Advances in Cryptology – Proceedings of CRYPTO '82
History of virtual learning environments in the 1990s (16,492 words) [view diff] exact match in snippet view article find links to article
between RBAC and multilevel security mandatory access (MLS/MAC) security policy models; role lemma relating RBAC and multilevel security. Al Seagren and