Policy-adaptive capability inheritance algorithm consistent with POSIX standard
In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they...
Saved in:
| Main Authors: | SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1 |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2006-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74667010/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Dynamic capabilities in strategic choice processes within organisations
by: Krzakiewicz Kazimierz, et al.
Published: (2017-05-01) -
Designing a model of effective marketing capabilities based on communication
by: Yoones Banisaeed, et al.
Published: (2025-02-01) -
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
by: TIAN Zhi-hong1, et al.
Published: (2007-01-01) -
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
by: TIAN Zhi-hong1, et al.
Published: (2007-01-01) -
Research on communication network system model oriented to the new communication services
by: WANG Ai-bao1, et al.
Published: (2008-01-01)