This paper addresses to the technique of security evaluation based on security attributes analysis in discretionary access control. A multi-level framework is built to calculate a set of effective user's permissions automatically. Information about the effective access rights is necessary during security verification procedure. In this paper we also propose a schema of Security Evaluation System. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Zegzhda, P. D., Zegzhda, D. P., & Kalinin, M. O. (2007). A new approach to security evaluation of operating systems. In Communications in Computer and Information Science (Vol. 1, pp. 254–259). https://doi.org/10.1007/978-3-540-73986-9_22
Mendeley helps you to discover research relevant for your work.