First Page | Document Content | |
---|---|---|
Date: 2006-04-13 14:58:02Computer security System software Software Trusted computing base Mandatory access control Security-Enhanced Linux Kernel Policy Monitoring System call XTS-400 | The Case for Abstracting Security PoliciesAdd to Reading ListSource URL: rich.recoil.orgDownload Document from Source WebsiteFile Size: 95,27 KBShare Document on Facebook |