First Page | Document Content | |
---|---|---|
Date: 2004-08-23 17:54:47Information theory Privilege revocation Evaluation Mandatory Integrity Control Ring Operating system Data integrity Unix Role-based access control Computer security Security LOMAC | Add to Reading ListSource URL: alum.wpi.eduDownload Document from Source WebsiteFile Size: 124,68 KBShare Document on Facebook |