A new approach to security evaluation of operating systems

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper addresses to the technique of security evaluation based on security attributes analysis in discretionary access control. A multi-level framework is built to calculate a set of effective user's permissions automatically. Information about the effective access rights is necessary during security verification procedure. In this paper we also propose a schema of Security Evaluation System. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Zegzhda, P. D., Zegzhda, D. P., & Kalinin, M. O. (2007). A new approach to security evaluation of operating systems. In Communications in Computer and Information Science (Vol. 1, pp. 254–259). https://doi.org/10.1007/978-3-540-73986-9_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free