Computer Science ›› 2008, Vol. 35 ›› Issue (2): 253-255.
Previous Articles Next Articles
Online:
Published:
Abstract: Generally, the security operating system makes use of the multi-mixed access control policies to guarantee the confidentiality and integrity of the static object, but the traditional access control policies still have some deficiencies in accessing the ob
Key words: Security operating system, Object, Trusted operating system, Trusted static object, Trusted dynamic object, Trusted object,TPM
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I2/253
Cited