نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2004
Peter A. Loscocco Stephen D. Smalley

Security-enhanced Linux incorporates a strong, flex­ ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep­ aration of information based on confidentiality and integrity requirements. This allows threats of tam­ pering and bypassing of application security mech­ anisms to be addressed and enables the confine­ ment of damage that can be caused by malic...

Journal: :TinyToCS 2016
Enrico Bacis Simone Mutti Marco Rosa Stefano Paraboschi

In the evolution of Android, the Mandatory Access Control (MAC) at the level of Linux kernel is assuming a central role. In the commonly used Discretionary Access Control (DAC), every resource has an owner that defines who can access the resource. In the MAC schema, instead, the access privileges are defined in a global policy, that is enforced by the kernel. Only the system administrator can c...

2008
Jafar Haadi Jafarian Morteza Amini Rasool Jalili

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments like military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes may be required in some environments. Moreover, as computing technology becomes more perv...

2007
Bandar Alhaqbani Colin J. Fidge

There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency. A number of countries are developing nationwide EHR systems to aggregate services currently provided by isolated Electronic Medical Record databases. However, such aggregation introduces new risks for patient privacy...

2009
Jafar Haadi Jafarian Morteza Amini

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

2013
Juanjuan Zhang

Consumers may infer a policy maker’s private information about relevant economic variables from its policy choice. I study this inference effect and its policy implications in the context of mandatory product content disclosure. I find that mandatory disclosure does not always benefit consumers. For example, by observing the government’s requirement to label genetically modified organisms (GMOs...

2010
KRISTA STERKEN

The Section 8 Housing Choice Voucher Program (“Section 8”) is an important effort to make quality housing accessible to low-income families. Although the federal program is voluntary, several states, cities, and local communities have responded to the problem of landlord rejection of Section 8 tenants with laws prohibiting discrimination based on a prospective tenant’s source-of-income. Mandato...

2011
Giuseppe Ianniello

This article explores recent regulatory reforms in Italy and analyzes the fi rst-time application of mandatory disclosure in annual reports of audit and non-audit fees. This information can convey to readers of fi nancial statements an indication of auditor independence (in appearance). An empirical analysis is conducted on annual reports of 239 Italian listed companies for the year 2007. The m...

2017
Sébastien Houde

I study how consumers respond to competing pieces of information that differ in their degree of complexity and informativeness. In particular, I study the choice of refrigerators in the U.S., where a mandatory disclosure labeling program provides detailed information about energy cost, and a certification labeling program provides a simple binary-star rating related to energy use. I find that t...

2008
Silvana Krasteva Huseyin Yildirim

The preference between public and private negotiations for a buyer who sequentially visits two suppliers is examined. It is shown that the buyer weakly prefers to conduct private negotiations in order to create strategic uncertainty about the trade history. With substitute goods, such uncertainty is valuable only when price offers have short expiries that prevent a head-to-head supplier competi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید