The Army Secure Operating System.
N. A. WaldhartPublished in: IEEE Symposium on Security and Privacy (1990)
Keyphrases
- operating system
- security mechanisms
- application level
- mandatory access control
- previously mentioned
- computer systems
- discretionary access control
- virtual machine
- high assurance
- protection scheme
- microsoft windows
- linux kernel
- virtual memory
- address space
- command line
- memory management
- windows xp
- security issues
- databases
- operating environment
- data encryption
- application programs
- red hat
- relational databases