Mandatory access control (Czech Wikipedia)

Analysis of information sources in references of the Wikipedia article "Mandatory access control" in Czech language version.

refsWebsite
Global rank Czech rank
1st place
1st place
355th place
132nd place
low place
low place
505th place
629th place
low place
low place
low place
low place
67th place
347th place
low place
low place
4,942nd place
2,638th place

apple.com (Global: 67th place; Czech: 347th place)

developer.apple.com

  • sandbox_init(3) man page [online]. 2007-07-07 [cit. 2008-03-15]. Dostupné online. 

code.google.com (Global: 4,942nd place; Czech: 2,638th place)

  • Security Enhanced PostgreSQL [online]. Dostupné online. 

fas.org (Global: 505th place; Czech: 629th place)

  • Executive Order 12958 [PDF online]. 1995-04-17 [cit. 2011-03-14]. Dostupné online. 

grsecurity.net (Global: low place; Czech: low place)

  • Why doesn't grsecurity use LSM? [online]. Dostupné online. 

kernelnewbies.org (Global: low place; Czech: low place)

  • TOMOYO Linux, an alternative Mandatory Access Control [online]. Linux Kernel Newbies. Dostupné online. 
  • Linux 2.6.36 released 20 October 2010 [online]. Linux Kernel Newbies. Dostupné online. 

nist.gov (Global: 355th place; Czech: 132nd place)

csrc.nist.gov

  • The Inevitability of Failure [PDF online]. National Security Agency [cit. 2011-03-14]. Dostupné online. 
  • Technical Rational Behind CSC-STD-003-85: Computer Security Requirements [TXT online]. 1985-06-25 [cit. 2011-03-14]. Dostupné online. 

postgresql.org (Global: low place; Czech: low place)

wiki.postgresql.org

  • SEPostgreSQL-patch [online]. Dostupné online. 

trustedbsd.org (Global: low place; Czech: low place)

  • TrustedBSD Project. TrustedBSD Mandatory Access Control (MAC) Framework [online]. [cit. 2008-03-15]. Dostupné online. 

web.archive.org (Global: 1st place; Czech: 1st place)

  • LOSCOCCO, Peter A; SMALLEY; STEPHEN D. Meeting Critical Security Objectives with Security-Enhanced Linux [PDF online]. [cit. 2011-03-14]. Dostupné v archivu pořízeném dne 2011-10-18. 
  • Trusted Computer System Evaluation Criteria [PDF online]. United States Department of Defense, 1985-11-01 [cit. 2011-03-14]. Dostupné v archivu pořízeném dne 2013-02-28. DoD Standard 5200.28-STD. 
  • National Information Assurance Partnership. The Common Criteria Evaluation and Validation Scheme Validated Products List [online]. [cit. 2008-03-15]. Dostupné v archivu pořízeném dne 2008-03-14. 
  • Tor-ramdisk Technical Considerations [online]. [cit. 2011-04-15]. Dostupné v archivu pořízeném dne 2011-10-06. 
  • Matthew Conover. Analysis of the Windows Vista Security Model [online]. Symantec Corporation [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2008-03-25. 
  • Steve Riley. Mandatory Integrity Control in Windows Vista [online]. [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2007-09-29. 
  • Mark Russinovich. PsExec, User Account Control and Security Boundaries [online]. [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2010-04-15. 
  • Trusted RUBIX [online]. [cit. 2018-08-30]. Dostupné v archivu pořízeném dne 2008-11-21. 
  • Official SMACK documentation from the Linux source tree [online]. [cit. 2015-01-09]. Dostupné v archivu pořízeném dne 2015-01-10. 
  • Jonathan Corbet. More stuff for 2.6.25 [online]. [cit. 2015-01-09]. Dostupné v archivu pořízeném dne 2015-01-09.