Login / Signup
Analyzing Integrity Protection in the SELinux Example Policy.
Trent Jaeger
Reiner Sailer
Xiaolan Zhang
Published in:
USENIX Security Symposium (2003)
Keyphrases
</>
data protection
optimal policy
data sets
data confidentiality
machine learning
asymptotically optimal
data integrity
operating system
information security
infinite horizon
allocation policy