Back to Results
First PageMeta Content
Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC


Document Date: 2004-08-23 17:54:47


Open Document

File Size: 124,68 KB

Share Result on Facebook
UPDATE