Dołącz do nas podczas Binding Hook Live 27 października w Underbelly Boulevard Soho w Londynie
Dołącz do nas na Binding Hook Live

Kontrola dostępu

This module explores access control, examining how to define and implement policies that restrict unauthorized access to systems, data, and resources in cybersecurity environments.

Portal > Cyberbezpieczeństwo > Kontrola dostępu

Kreator programów nauczania

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

https://doi.org/10.1145/362375.362389

Bell, David E., and Leonard J. La Padula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731, 1975.

Watson, Robert N. M. “A Decade of OS Access-Control Extensibility.” Communications of the ACM 56, no. 2 (2013): 52–63.

https://doi.org/10.1145/2408776.2408792

Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.

http://www.combex.com/papers/darpa-review/security-review.pdf

Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278 Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 1 (November 1973).

https://apps.dtic.mil/sti/pdfs/AD0770768.pdf

Dziękujemy za zapisanie się do naszego newslettera!

Thank you! RSVP received for Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Dziękujemy za zgłoszenie! Będziemy w kontakcie.

Apply for: Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Ładowanie...

Ładowanie...