作者: C. Richard Attanasio , Peter W. Markstein , Ray J. Phillips , None
DOI: 10.1147/SJ.151.0102
关键词:
摘要: Discussed is a methodology for discovering operating system design flaws as an approach to learning techniques that may make possible greater data security. Input/output has been found be involved in most of the weaknesses discovered by study team particular version system. Relative simplicity was source greatest protection against penetration efforts.