Rejoignez-nous au Binding Hook Live le 27 octobre au Underbelly Boulevard Soho à Londres.
Rejoignez-nous au Binding Hook Live

Contrôle d'accès

This module explores access control, examining how to define and implement policies that restrict unauthorized access to systems, data, and resources in cybersecurity environments.

Portail > Cybersécurité > Contrôle d'accès

Bâtisseur de programmes d'études

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

https://doi.org/10.1145/362375.362389

Bell, David E., and Leonard J. La Padula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731, 1975.

Watson, Robert N. M. “A Decade of OS Access-Control Extensibility.” Communications of the ACM 56, no. 2 (2013): 52–63.

https://doi.org/10.1145/2408776.2408792

Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.

http://www.combex.com/papers/darpa-review/security-review.pdf

Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278 Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 1 (November 1973).

https://apps.dtic.mil/sti/pdfs/AD0770768.pdf

Merci de vous être inscrit à notre lettre d'information !

Thank you! RSVP received for Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Merci d'avoir posé votre candidature ! Nous vous contacterons.

Apply for: Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Chargement...

Chargement...