Computer Science ›› 2006, Vol. 33 ›› Issue (1): 153-157.

Previous Articles     Next Articles

YI Xiao-Dong, YANG Xue-Jun (College of Computer, National Univ, of Defense Technology, Changsha 410073)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The security requirements of current operating system become more and more diverse, flexible and concrete. Usually, they only specify the constraints among a little set of entities of the system, but expect to be implemented quickly and expediently. These

Key words: FMAC, Operating system security, Security policy model, Mandatory access control framework

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!