Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,863 papers from all fields of science
Search
Sign In
Create Free Account
AppArmor
Known as:
App Armor
, AppArmour
AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Application firewall
Bourne shell
C++
Comparison of Linux distributions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Attribute-based Network and System Access Control Architecture for Industrial Machines
Alexander Kern
,
R. Anderl
International Conference on Internet of Things…
2019
Corpus ID: 209460021
With the increasing digitization and interconnection of industry, there are many opportunities for new business models. These…
Expand
2018
2018
Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
Alexander Kern
,
R. Anderl
Fifth International Conference on Internet of…
2018
Corpus ID: 54443388
In recent years, digitalization is having a great impact on industry. Especially the rising degree of cross-linked machines is…
Expand
2015
2015
Mitigation of Virtunoid Attacks on Cloud Computing Systems
Daniel McKinnon Forsell
2015
Corpus ID: 88507424
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtualisation control program QEMU…
Expand
2013
2013
Providing data anonymity for a secure database infrastructure
T. Popeea
,
A. Constantinescu
,
R. Rughinis
11th RoEduNet International Conference
2013
Corpus ID: 49806
The evolution of computer technology renders servers, workstations, computers and even mobile devices more and more powerful…
Expand
2012
2012
Inference Detection and Database Security for a Business Environment
T. Popeea
,
A. Constantinescu
,
L. Gheorghe
,
N. Tapus
Fourth International Conference on Intelligent…
2012
Corpus ID: 1452935
The number of data collections of person-specific information is increasing exponentially. The risks of compromising privacy are…
Expand
2011
2011
Enhanced security for monitoring services in large scale distributed systems
Florin Pop
,
Alexandra Arcalianu
,
C. Dobre
,
V. Cristea
IEEE 7th International Conference on Intelligent…
2011
Corpus ID: 2645156
Today computing systems employ high interaction between people and services. It is more than obvious that todays society depends…
Expand
2010
2010
AD Windows Server Windows Network Mac OS X Debian SUSE Red Hat CentOS Ubuntu Disks Comparing Free Active Directory Integration Offerings for Linux Systems by Rodney Ruddock , Interop Systems
Centos Centos
,
Ubuntu Ubuntu
,
Rodney Ruddock
2010
Corpus ID: 7110962
EXECUTIVE SUMMARY Between the Centrify Express and Likewise Open products a quick glance Comparing the three different free at…
Expand
2008
2008
PULSE: a Pluggable User-space Linux Security Environment paper
A. Murray
,
D. Grove
Artificial Intelligence and Symbolic Computation
2008
Corpus ID: 7094049
The discretionary access controls (DAC) employed by traditional operating systems only provide system administrators and users…
Expand
2006
2006
Centralized Security Policy Support for Virtual Machine
Anh-Quynh Nguyen
,
R. Ando
,
Yoshiyasu Takefuji
LiSA
2006
Corpus ID: 5098025
For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems…
Expand
2006
2006
Pingüino paranoico: Una introducción a Novell AppArmor
Michael W. Bauer
2006
Corpus ID: 169160073
?Quien dice que "control de acceso obligatorio facil de usar" sea una contradiccion de terminos?.
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE