Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

LOMAC

Low Water-Mark Mandatory Access Control (LOMAC) is a Mandatory Access Control model which protects the integrity of system objects and subjects by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Most range-based localization approaches for wireless sensor networks (WSNs) rely on accurate and sufficient range measurements… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
A diversity-oriented approach for the synthesis of 2-aminoimidazoles is presented. The method involves the cyclization of… Expand
Review
2016
Review
2016
Group behavior and interactions of endangered blue whales (Balaenoptera musculus) have not been systematically studied. We… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
2009
2009
(1) Research Group SynBioC, Department of Organic Chemistry, Faculty of Bioscience Engineering, Ghent University, Coupure Links… Expand
2008
2008
A short and efficient route to 1,4-substituted 2-aminoim- idazole alkaloids starting from the easily accessible 2-alkylami… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
2004
2004
In this paper, we define constraint conflicts and examine properties that may aid in guiding their resolution. A constraint… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2004
2004
Linux is an open source operating system that is rapidly gaining popularity in consumer electronic devices, especially in digital… Expand
  • figure 3
  • figure 1
  • figure 2
  • figure 4
  • figure 5
2001
2001
  • T. Fraser
  • USENIX Annual Technical Conference, FREENIX Track
  • 2001
  • Corpus ID: 41349416
LOMAC is a security enhancement for Linux kernels. LOMAC demonstrates that it is possible to apply Mandatory Access Control… Expand
Highly Cited
2000
Highly Cited
2000
  • T. Fraser
  • Proceeding IEEE Symposium on Security and…
  • 2000
  • Corpus ID: 15875545
We hypothesize that a form of kernel-resident access control based integrity protection can gain widespread acceptance in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5