For example, certain computer programs are granted a trusted status with special hard-coded privileges. In order to practically implement the LOMAC, the LOMAC requires that exceptions to the security rules be granted in order to overcome an access control mechanism that is too coarse grained.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |