First Page | Document Content | |
---|---|---|
![]() Date: 2003-07-02 11:18:02Information theory Principle of least privilege Ring Trusted computing base Authorization Operating system Reference monitor Privilege Security Computer security Access control | Add to Reading List |