Computer Science ›› 2007, Vol. 34 ›› Issue (2): 264-266.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Failures or discontinuities in secure operating systems may be inevitable because of internal or external reasons, and then security compromises. First, a common security model is given out in this paper. Then it is extended to in clude security compromis

Key words: Security compromise,Trusted recovery, Confidentiality, Integrity, Secure operating system

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!