| Name | Last modified | Size | |
|---|---|---|---|
![]() | Parent Directory | ||
![]() | APPARMOR | 2022-02-22 06:15 | |
![]() | PAM | 2022-02-22 06:15 | |
![]() | SELINUX | 2022-02-22 06:15 | |
![]() | Access Control in Data Management Systems - Morgan & Claypool. Elena Ferrari (2010).pdf | 2022-02-22 06:15 | 563 KB |
![]() | Enhancement of Business IT Alignment by Including Responsibility Components in RBAC.pdf | 2022-02-22 06:15 | 546 KB |
![]() | Mandatory Access Control.pdf | 2022-02-22 06:15 | 34 KB |
![]() | Methods for Access Control. Advances and Limitations.pdf | 2022-02-22 06:15 | 104 KB |
![]() | Reference Monitor - Trent Jaeger.pdf | 2022-02-22 06:15 | 52 KB |
![]() | Role-Based Access Control 2nd Edition - David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli (2007).pdf | 2022-02-22 06:15 | 1566 KB |
![]() | Role-Based Access Controls.pdf | 2022-02-22 06:15 | 58 KB |
![]() | Sudo Mastery, User Access Control for Real People - Michael W Lucas (2013).pdf | 2022-02-22 06:15 | 850 KB |
![]() | The Simplified Mandatory Access Control Kernel.pdf | 2022-02-22 06:15 | 242 KB |
![]() | Trojan Horse Resistant Discretionary Access Control.pdf | 2022-02-22 06:15 | 151 KB |
![]() | Unprivileged login daemons in Linux.pdf | 2022-02-22 06:15 | 118 KB |