Works best with JavaScript enabled!Works best in modern browsers!powered by h5ai
NameLast modifiedSize
folder-parentParent Directory
folderAPPARMOR2022-02-22 06:15
folderPAM2022-02-22 06:15
folderSELINUX2022-02-22 06:15
fileAccess Control in Data Management Systems - Morgan & Claypool. Elena Ferrari (2010).pdf2022-02-22 06:15563 KB
fileEnhancement of Business IT Alignment by Including Responsibility Components in RBAC.pdf2022-02-22 06:15546 KB
fileMandatory Access Control.pdf2022-02-22 06:1534 KB
fileMethods for Access Control. Advances and Limitations.pdf2022-02-22 06:15104 KB
fileReference Monitor - Trent Jaeger.pdf2022-02-22 06:1552 KB
fileRole-Based Access Control 2nd Edition - David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli (2007).pdf2022-02-22 06:151566 KB
fileRole-Based Access Controls.pdf2022-02-22 06:1558 KB
fileSudo Mastery, User Access Control for Real People - Michael W Lucas (2013).pdf2022-02-22 06:15850 KB
fileThe Simplified Mandatory Access Control Kernel.pdf2022-02-22 06:15242 KB
fileTrojan Horse Resistant Discretionary Access Control.pdf2022-02-22 06:15151 KB
fileUnprivileged login daemons in Linux.pdf2022-02-22 06:15118 KB