Mandatory access control (Czech Wikipedia)

Analysis of information sources in references of the Wikipedia article "Mandatory access control" in Czech language version.

refsWebsite
Global rank Czech rank
1st place
1st place
355th place
132nd place
low place
low place
505th place
629th place
low place
low place
low place
low place
67th place
347th place
low place
low place
4,942nd place
2,638th place

apple.com

developer.apple.com

  • sandbox_init(3) man page [online]. 2007-07-07 [cit. 2008-03-15]. Dostupné online. 

code.google.com

  • Security Enhanced PostgreSQL [online]. Dostupné online. 

fas.org

  • Executive Order 12958 [PDF online]. 1995-04-17 [cit. 2011-03-14]. Dostupné online. 

grsecurity.net

  • Why doesn't grsecurity use LSM? [online]. Dostupné online. 

kernelnewbies.org

  • TOMOYO Linux, an alternative Mandatory Access Control [online]. Linux Kernel Newbies. Dostupné online. 
  • Linux 2.6.36 released 20 October 2010 [online]. Linux Kernel Newbies. Dostupné online. 

nist.gov

csrc.nist.gov

  • The Inevitability of Failure [PDF online]. National Security Agency [cit. 2011-03-14]. Dostupné online. 
  • Technical Rational Behind CSC-STD-003-85: Computer Security Requirements [TXT online]. 1985-06-25 [cit. 2011-03-14]. Dostupné online. 

postgresql.org

wiki.postgresql.org

  • SEPostgreSQL-patch [online]. Dostupné online. 

trustedbsd.org

  • TrustedBSD Project. TrustedBSD Mandatory Access Control (MAC) Framework [online]. [cit. 2008-03-15]. Dostupné online. 

web.archive.org

  • LOSCOCCO, Peter A; SMALLEY; STEPHEN D. Meeting Critical Security Objectives with Security-Enhanced Linux [PDF online]. [cit. 2011-03-14]. Dostupné v archivu pořízeném dne 2011-10-18. 
  • Trusted Computer System Evaluation Criteria [PDF online]. United States Department of Defense, 1985-11-01 [cit. 2011-03-14]. Dostupné v archivu pořízeném dne 2013-02-28. DoD Standard 5200.28-STD. 
  • National Information Assurance Partnership. The Common Criteria Evaluation and Validation Scheme Validated Products List [online]. [cit. 2008-03-15]. Dostupné v archivu pořízeném dne 2008-03-14. 
  • Tor-ramdisk Technical Considerations [online]. [cit. 2011-04-15]. Dostupné v archivu pořízeném dne 2011-10-06. 
  • Matthew Conover. Analysis of the Windows Vista Security Model [online]. Symantec Corporation [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2008-03-25. 
  • Steve Riley. Mandatory Integrity Control in Windows Vista [online]. [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2007-09-29. 
  • Mark Russinovich. PsExec, User Account Control and Security Boundaries [online]. [cit. 2007-10-08]. Dostupné v archivu pořízeném dne 2010-04-15. 
  • Trusted RUBIX [online]. [cit. 2018-08-30]. Dostupné v archivu pořízeném dne 2008-11-21. 
  • Official SMACK documentation from the Linux source tree [online]. [cit. 2015-01-09]. Dostupné v archivu pořízeném dne 2015-01-10. 
  • Jonathan Corbet. More stuff for 2.6.25 [online]. [cit. 2015-01-09]. Dostupné v archivu pořízeném dne 2015-01-09.