Back to Results
First PageMeta Content
Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400


The Case for Abstracting Security Policies   
Add to Reading List

Document Date: 2006-04-13 14:58:02


Open Document

File Size: 95,27 KB

Share Result on Facebook
UPDATE