作者: Paul A. Karger
关键词:
摘要: Many discretionary Trojan Horse attacks can be defeated by a table-driven file name translation mechanism that has knowledge of the normal patterns use computer system. File is built into protected subsystem, and human user queried about possible violations access control policies. The technique most effective against unauthorized tampering or sabotage used in conjunction with non-discretionary security controls.