Back to Results
First PageMeta Content
Crime prevention / National security / Operating system / Mandatory access control / Password / Kernel / Access Control Matrix / Capability-based security / Ring / Security / Computer security / Access control


Microsoft Word - OS Security Considerations
Add to Reading List

Document Date: 2005-07-05 08:26:00


Open Document

File Size: 107,38 KB

Share Result on Facebook

City

River / Reading / /

Company

IBM / Prentice-Hall / Philips / /

/

Facility

Hall PTR / Griffith University / /

IndustryTerm

large and complex software systems / computer systems / authentication systems / user systems / cryptographic systems / cryptographic algorithms / software methods / software routines / software components / Weak authentication protocols / weak algorithms / cryptographic algorithm / data processing systems / Weak cryptographic algorithms / secure applications / authentication protocols / approach network / /

OperatingSystem

MS-DOS / SunOS / Windows NT / Share / /

Organization

Griffith University / /

Person

Mohammad Heidari / William Stallings / /

Position

guard / resource manager / access matrix model for DAC / programmer / /

Technology

Info technology / Overly weak algorithms / Flow Control / paging system / File Sharing / Paging / Weak authentication protocols / operating system / Weak cryptographic algorithms / Operating Systems / process control / Access Control List / /

SocialTag