Computer Science ›› 2008, Vol. 35 ›› Issue (2): 253-255.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Generally, the security operating system makes use of the multi-mixed access control policies to guarantee the confidentiality and integrity of the static object, but the traditional access control policies still have some deficiencies in accessing the ob

Key words: Security operating system, Object, Trusted operating system, Trusted static object, Trusted dynamic object, Trusted object,TPM

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!