language:
Find link is a tool written by Edward Betts.searching for Mandatory access control 12 found (80 total)
alternate case: mandatory access control
Cruzer Enterprise
(434 words)
[view diff]
exact match in snippet
view article
find links to article
an encrypted USB flash drive. This secure USB drive imposed a mandatory access control on all files, storing them in a hardware-encrypted, password-protectedCyberCIEGE (997 words) [view diff] exact match in snippet view article find links to article
be configured with operating systems that enforce label-based mandatory access control policies. Players can deploy Public Key Infrastructure (PKI)-basedNetfilter (2,724 words) [view diff] case mismatch in snippet view article find links to article
general-purpose filtering (firewalling). security_filter module Used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK andApplication firewall (1,059 words) [view diff] case mismatch in snippet view article find links to article
Definition from WhatIs.com". SearchSecurity. Retrieved 2020-11-15. "Mandatory Access Control (MAC) Framework". TrustedBSD. Retrieved 2013-09-05. "Safing Portmaster"FLASK (158 words) [view diff] case mismatch in snippet view article find links to article
SELinux from the NSA TrustedBSD OpenSolaris Project: Flexible Mandatory Access Control Flask: Flux Advanced Security Kernel GFAC: A similar FrameworkSecurity-evaluated operating system (1,106 words) [view diff] exact match in snippet view article find links to article
adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained accessLinux From Scratch (1,349 words) [view diff] exact match in snippet view article find links to article
focuses on security enhancements such as hardened kernel patches, mandatory access control policies, stack-smashing protection, and address space layout randomizationComparison of BSD operating systems (3,818 words) [view diff] exact match in snippet view article find links to article
work includes Common Criteria security functionality, such as mandatory access control and security event audit support. Derivatives: TrueNAS/FreeNASInformation security (18,159 words) [view diff] exact match in snippet view article find links to article
resource the ability to control access to those resources. In the mandatory access control approach, access is granted or denied basing upon the securityRpath (1,486 words) [view diff] exact match in snippet view article find links to article
distribution. Lastly, as said, rpath is a security feature however "mandatory access control" (MAC) and other techniques can be as effective or more effectiveMobile security (11,017 words) [view diff] case mismatch in snippet view article find links to article
Sang-bum; Jeong, Bokdeuk; Mo, Sangdok (January 2008). A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization. 5th IEEEMultiple single-level (2,487 words) [view diff] exact match in snippet view article find links to article
deferred to a separate stratum of software that invisibly manages mandatory access control concerns so that superjacent strata need not. This concept is none