Cited By
View all- Nakamura YSameshima YTabata T(2009)SEEditProceedings of the 23rd conference on Large installation system administration10.5555/1855698.1855706(8-8)Online publication date: 1-Nov-2009
Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources,...
This paper introduces Security Enhanced Linux (SELinux) as the required Operating System (OS) to enforce Mandatory Access Control (MAC) mechanisms to protect Health Information. Health Information Systems (HIS) require an OS which can enforce MAC rules ...
Enterprise applications are designed to address specific business needs and are generally run within the internal corporate networks. Access to enterprise applications is controlled by various corporate policies, based on numerous widely accepted ...
IEEE Computer Society
United States