首页 | 本学科首页   官方微博 | 高级检索  
     


How to Trap the Network Intruder
Authors:Jeff Flynn
Abstract:Abstract

There is a level of sensitivity to almost all data, but what is most important — keeping sensitive data sensitive or guaranteeing the integrity of the data? When it comes to sensitivity or integrity, access control models have provided several options. Yet, wouldn't a combination of access control models provide a more desirable result than just settling for one? Is it possible to have a slice of data sensitivity with a dollop of data integrity? In finding the answer to this question it must be understood exactly what an access control model is and, in terms of sensitivity and integrity, which models provide the best security.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号