Computer Science ›› 2008, Vol. 35 ›› Issue (1): 288-289.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Access control based malicious code defending model has vulnerabilities because it may be circumvented in certain circumstances. In addition, its effectiveness depends on that of the access control policy applied. A crypto-based security model against mal

Key words: Security model, Malicious code defending, Secure operating system

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!