Pages that link to "Discretionary access control"
From HandWiki
The following pages link to Discretionary access control:
Displayed 35 items.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Computer security (← links)
- XACML (← links)
- Extended file attributes (← links)
- Principle of least privilege (← links)
- Network File System (← links)
- Computer security model (← links)
- Model-driven security (← links)
- Files-11 (← links)
- Access control (← links)
- Trusted system (← links)
- Trusted Computer System Evaluation Criteria (← links)
- Purple Penelope (← links)
- LOMAC (← links)
- Computer access control (← links)
- Attribute-based access control (← links)
- Bell–LaPadula model (← links)
- Need to know (← links)
- ACF2 (← links)
- Mandatory access control (← links)
- List of computing and IT abbreviations (← links)
- Type enforcement (← links)
- Role-based access control (← links)
- Security modes (← links)
- Biba Model (← links)
- DACL (redirect page) (← links)
- NTFS (← links)
- Access control expression (← links)
- Multilevel security (← links)
- Engineering:Intel iAPX 432 (← links)
- Software:XTS-400 (← links)
- Software:AppArmor (← links)
- Software:Security-Enhanced Linux (← links)
- Software:Linux kernel (← links)
- Software:Cross-domain solution (← links)
- Software:DELTREE (← links)