The following pages link to Discretionary access control
External toolsShowing 50 items.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Computer security (links | edit)
- Multics (links | edit)
- NTFS (links | edit)
- Access control (links | edit)
- List of computing and IT abbreviations (links | edit)
- Network File System (links | edit)
- Trusted system (links | edit)
- Security-Enhanced Linux (links | edit)
- Role-based access control (links | edit)
- DAC (links | edit)
- Uccel (links | edit)
- Bell–LaPadula model (links | edit)
- Intel iAPX 432 (links | edit)
- Biba Model (links | edit)
- Files-11 (links | edit)
- RSBAC (links | edit)
- Mandatory access control (links | edit)
- Multilevel security (links | edit)
- Context-based access control (links | edit)
- XACML (links | edit)
- Security modes (links | edit)
- Computer security model (links | edit)
- Discretionary Access Control (redirect page) (links | edit)
- DACL (redirect page) (links | edit)
- Access-control list (links | edit)
- User:Reza1615/RedirectsWithInterwiki (links | edit)
- User:Paul.j.richardson/Books/Web-Auth-ID-&-Access (links | edit)
- User:JPxG/Oracle/2005-12 (links | edit)
- Misplaced Pages:Articles for deletion/Log/2005 December 1 (links | edit)
- Misplaced Pages:Articles for deletion/DACL (links | edit)
- Extended file attributes (links | edit)
- AppArmor (links | edit)
- Type enforcement (links | edit)
- Need to know (links | edit)
- Lattice-based access control (links | edit)
- XTS-400 (links | edit)
- DELTREE (links | edit)
- Cross-domain solution (links | edit)
- ACF2 (links | edit)
- LOMAC (links | edit)
- Organisation-based access control (links | edit)
- Attribute-based access control (links | edit)
- Linux kernel (links | edit)
- Trusted Computer System Evaluation Criteria (links | edit)
- OS 2200 (links | edit)
- Principle of least privilege (links | edit)
- Risk-based authentication (links | edit)
- Model-driven security (links | edit)
- Purple Penelope (links | edit)
- Computer access control (links | edit)
- Graph-based access control (links | edit)
- Access control expression (links | edit)
- Talk:Discretionary access control (transclusion) (links | edit)
- User:FollowTheMedia/Books/IS Hardening (links | edit)
- User:Kernel.package/Books/CISSP Prep 1 (links | edit)
- User:BevFinch/sandbox (links | edit)