MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Computational trustInterfaceSandboxAuthentication protocolAuthorizationCross-domain solutionTrademarkPrivilege separationCryptographic protocolInter-process communicationMultilevel securityChain of trustMandatory access controlDiscretionary access controlSynchronizationIpsecProtection ringCovert channelTake-grant protection modelTrust anchorSecurity associationIdentity assuranceFirewallSecure copy protocolType systemSecurity engineeringGarbled circuitKey exchangeCommunication protocolApplication domainFile lockingProof-carrying codeSignaling protocolLogical access controlControl-flow integrityBusiness logicMutual authenticationCode signingLanguage interoperabilityAccess control matrixLattice-based access controlGuardRole-based access controlDigital securityMessage authenticationComputer securityFunctional requirementCapability-based securityInformation hidingConceptual modelData typeRelational operatorInformation security managementSplit tunnelingTransmission securitySemaphoreAdaptationRuntime systemLockCouplingTrusted computing baseNetwork serviceOntologyEventNetwork securityExecutable space protectionEncapsulationFile integrity monitoringData access layerSmart contractDelimiterControl flowLoginMemory corruptionBuffer overflowMessaging patternElectronic authenticationPre-boot authenticationMicrocodeThreatDatabase securitySoftware systemTunneling protocolData mappingAttribute-based access controlPrivate set intersectionInformation modelAccess tokenFile synchronizationProgramming language specificationTransport layerReferenceComposite data typeBoolean data typeHigh- and low-levelAccess controlMultitier architectureSoftware agentShared memoryData dependency