Computer Science ›› 2007, Vol. 34 ›› Issue (9): 277-281.
Previous Articles Next Articles
Online:
Published:
Abstract: The insider behaviors in the traditional Operating System are distrustful, because the access control theories in the traditional Operating System is a kind of "gate control", which don't permit someone who has no the right identity to come in, but once t
Key words: User behavior, Insider threat, Open authorization, Behavior tree, OS behavior tree, User behavior tree, Behavior trace, Behavior monitoring
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I9/277
Cited