Computer Science ›› 2007, Vol. 34 ›› Issue (9): 277-281.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: The insider behaviors in the traditional Operating System are distrustful, because the access control theories in the traditional Operating System is a kind of "gate control", which don't permit someone who has no the right identity to come in, but once t

Key words: User behavior, Insider threat, Open authorization, Behavior tree, OS behavior tree, User behavior tree, Behavior trace, Behavior monitoring

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!