Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,055 papers from all fields of science
Search
Sign In
Create Free Account
Mandatory access control
Known as:
Mac
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access control
Application programming interface
Bell–LaPadula model
Clark–Wilson model
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Enhancing accountability of electronic health record usage via patient-centric monitoring
D. Mashima
,
M. Ahamad
International Health Informatics Symposium
2012
Corpus ID: 5995896
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health…
Expand
Review
2008
Review
2008
Review: Sheep Traceability Systems in Selected Countries Outside of North America
P. Bass
,
D. Pendell
,
+6 authors
G. Smith
2008
Corpus ID: 53571990
Animal diseases and related food safety issues, such as bovine spongiform encephalopathy, have become concerns to many people in…
Expand
2007
2007
Securing Grid Data Using Mandatory Access Controls
Matt Henricksen
,
W. Caelli
,
P. Croll
Australasian Computer Science Week
2007
Corpus ID: 12292030
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by…
Expand
2007
2007
SecureBus: towards application-transparent trusted computing with mandatory access control
Xinwen Zhang
,
M. Covington
,
Songqing Chen
,
R. Sandhu
ACM Asia Conference on Computer and…
2007
Corpus ID: 5708739
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious…
Expand
2006
2006
Package merge in UML 2: practice vs. theory?
Alanna Zito
,
Z. Diskin
,
J. Dingel
ACM/IEEE International Conference on Model Driven…
2006
Corpus ID: 8616323
The notion of compliance is meant to facilitate tool interoperability. UML 2 offers 4 compliance levels. Level Li+1 is obtained…
Expand
2003
2003
Verifying enterprise's mandatory access control policies with coloured Petri nets
K. Juszczyszyn
WET ICE . Proceedings. Twelfth IEEE International…
2003
Corpus ID: 9283263
The paper addresses important problems met when implementing mandatory access control policies in complex distributed systems (e…
Expand
Review
2003
Review
2003
EMERGING ROLES FOR FOOD LABELS: INFORM, PROTECT, PERSUADE
S. Henneberry
,
W. Armbruster
2003
Corpus ID: 54499974
Every day, food producers and processors provide products consumed by 250 million people in this country. Each of those consumers…
Expand
Highly Cited
2002
Highly Cited
2002
Is Structural Separation of Incumbent Local Exchange Carriers Necessary for Competition
R. Crandall
,
J. Sidak
2002
Corpus ID: 150840540
Although competitive local exchange carriers (CLECs) collectively have gained considerable market share since the passage of the…
Expand
1995
1995
Conceptual schema & relational database design
T. Halpin
1995
Corpus ID: 62139037
Information Levels. Fact Types. Uniqueness Constraints. Mandatory Roles. Value, Set Comparison and Subtype Constraints. Other…
Expand
1973
1973
Mandatory Wilderness Permits: A Necessary Management Tool
J. Hendee
,
R. Lucas
1973
Corpus ID: 89985427
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE