Sciweavers

16 search results - page 4 / 4
» A Stateless Traceback Technique for Identifying the Origin o...
Sort
View
SACMAT
2009
ACM
13 years 11 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang