the Discretionary Access Control (DAC) system which is used by many Unix systems. There are already variouse approces to restrict access of applications, those are usually Mandatory Access Control ...
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed ...
2 State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China 3 Key Laboratory of Information and Network Security, 3rd Research Institute, ...
一部の結果でアクセス不可の可能性があるため、非表示になっています。
アクセス不可の結果を表示する