Enforcement of Integrated Security Policy in Trusted Operating Systems.
Hyung Chan KimRudrapatna S. RamakrishnaWook ShinKouichi SakuraiPublished in: IWSEC (2007)
Keyphrases
- security policies
- mandatory access control
- operating system
- access control
- discretionary access control
- distributed systems
- access control policies
- network security
- security management
- multilevel secure
- network management
- distributed environment
- security requirements
- role based access control
- computer systems
- xml access control
- trusted computing
- application programs
- fine grained
- virtual memory
- intrusion detection system
- windows xp
- virtual machine
- database