Mandatory access control

Known as: Mac 
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1977-2018
0204019772018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2015
2015
The wide adoption of Docker and the ability to retrieve images from different sources impose strict security constraints. Docker… (More)
  • figure 1
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper we tackle the challenge of providing a generic security architecture for the Android OS that can serve as a… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2009
2009
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls… (More)
  • figure 1
  • figure 2
Is this relevant?
2008
2008
This technical report presents a practical security architecture for Linux-based mobile platforms. The main development goals… (More)
  • figure 1
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
Is this relevant?
2002
2002
In today’s world, the use of computers and networks is growing and the vision of a single infrastructure for voice and data is… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary… (More)
  • figure 5
  • figure 8
Is this relevant?
1998
1998
Two basic paradigms towards speciication of information security requirements can be taken: continuous speciication and early… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper we reexamine the interaction between role-based access control and mandatory access control. We examine the… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • figure 5
Is this relevant?