Sciweavers

16 search results - page 4 / 4
» A Stateless Traceback Technique for Identifying the Origin o...
Sort
View
SACMAT
2009
ACM
14 years 8 days ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang