Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

LOMAC

Low Water-Mark Mandatory Access Control (LOMAC) is a Mandatory Access Control model which protects the integrity of system objects and subjects by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Most range-based localization approaches for wireless sensor networks (WSNs) rely on accurate and sufficient range measurements… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
Group behavior and interactions of endangered blue whales (Balaenoptera musculus) have not been systematically studied. We… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2016
2016
A diversity-oriented approach for the synthesis of 2-aminoimidazoles is presented. The method involves the cyclization of… Expand
Is this relevant?
2009
2009
(1) Research Group SynBioC, Department of Organic Chemistry, Faculty of Bioscience Engineering, Ghent University, Coupure Links… Expand
Is this relevant?
2008
2008
A short and efficient route to 1,4-substituted 2-aminoim- idazole alkaloids starting from the easily accessible 2-alkylami… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
Is this relevant?
2004
2004
In this paper, we define constraint conflicts and examine properties that may aid in guiding their resolution. A constraint… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2004
2004
Linux is an open source operating system that is rapidly gaining popularity in consumer electronic devices, especially in digital… Expand
  • figure 3
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2001
2001
  • Timothy Fraser
  • USENIX Annual Technical Conference, FREENIX Track
  • 2001
  • Corpus ID: 41349416
LOMAC is a security enhancement for Linux kernels. LOMAC demonstrates that it is possible to apply Mandatory Access Control… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
  • Timothy Fraser
  • Proceeding IEEE Symposium on Security and…
  • 2000
  • Corpus ID: 15875545
We hypothesize that a form of kernel-resident access control based integrity protection can gain widespread acceptance in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1999
1999
 
Is this relevant?