Computer Science ›› 2008, Vol. 35 ›› Issue (1): 288-289.
Previous Articles Next Articles
Online:
Published:
Abstract: Access control based malicious code defending model has vulnerabilities because it may be circumvented in certain circumstances. In addition, its effectiveness depends on that of the access control policy applied. A crypto-based security model against mal
Key words: Security model, Malicious code defending, Secure operating system
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I1/288
Cited