Computer Science ›› 2008, Vol. 35 ›› Issue (1): 281-284.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Most security operating system doesn't distinguish the sorts of the object, and labels them by the same method, moreover, the objects, which is protected by the traditional access control policies in most security operating system, are the static object,

Key words: Security operating system, Object, Trusted operating system, Trusted dynamic object, TPM

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!