Computer Science ›› 2008, Vol. 35 ›› Issue (1): 281-284.
Previous Articles Next Articles
Online:
Published:
Abstract: Most security operating system doesn't distinguish the sorts of the object, and labels them by the same method, moreover, the objects, which is protected by the traditional access control policies in most security operating system, are the static object,
Key words: Security operating system, Object, Trusted operating system, Trusted dynamic object, TPM
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I1/281
Cited