5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Componen
DOI: 10.1109/icis-comsar.2006.18
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Analyzing the Windows and Linux Security Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
0
0
Order By: Relevance
“…Literature [4] and Literature [5] pointed out that the safety of the operating system involves many factors; the key issue is not the choice of system but the possibility of establishing a complete security system with qualified administrators to maintenance.…”
Section: Security Analysismentioning
confidence: 99%
“…Literature [4] and Literature [5] pointed out that the safety of the operating system involves many factors; the key issue is not the choice of system but the possibility of establishing a complete security system with qualified administrators to maintenance.…”
Section: Security Analysismentioning
confidence: 99%