Dissertation 

About 64 item dissertation in line with secure operating system query results,the following is 1 to 50(Search took 0.093 seconds)

  1. Research on Key Technologies for Access Control of High-level Secure Operating System,WangDaHai/Beijing University of Technology,1/122
  2. Research on Automatic Generation Mechanism for Security Policy Based on Trusted Computing,GaoZuo/Beijing University of Technology,0/4
  3. Design and Realize on Secure Label Mechanism for High-level Secure Operatiing System,WangLei/Beijing University of Technology,0/4
  4. Researching of Implementation of High Level Secure Trusted Operationg System,HuJun/Institute of Electronics,2/815
  5. Research on Function Isolation Mechanism of Secure Operating System,TangLing/University of Science and Technology of China,5/344
  6. Study on Access Control and Real-Time Alert of Secure Operating System,LiHongJiao/Shanghai Jiaotong University,1/545
  7. Research on the Trusted Operating System,TanLiang/University of Electronic Science and Technology,7/1172
  8. Research on Authentication and Access Control Technologies Based on Trustworthiness in Secure Operating System,WangLunWei/National University of Defense Science and Technology,5/758
  9. Research on Security Techniques of Embedded Operating System,WuXinYong/University of Electronic Science and Technology,10/981
  10. Security Audit and Audit-Based Intrusion Detection,ZhangXiangFeng/Institute of Software,13/756
  11. Research on Trusted Process Mechanism and Related Problems,LiangBin/Institute of Software,10/551
  12. Research on Some Key Technologies of Secure Operating System,LiuHaiFeng/Institute of Software,7/590
  13. Research on Some Key Technologies of Structured Protection Level Secure Operating System Development,LiuWenQing/Institute of Software,11/345
  14. Research on the Framework for Multi-Policies and Practice in Secure Operating System,DanZhiYong/Institute of Software,7/289
  15. Research on and Enforcement of Malware-Defending Technology of Secure Operating Systems,ZhaoQingSong/Institute of Software,15/589
  16. Safe operation of the system model and the implementation structure,ZhuLuHua/PLA Information Engineering University,7/603
  17. Research on and Enforcement of Secure Operating System Supporting Multiple Security Policy,LiangHongLiang/Institute of Software,19/439
  18. Formal Modeling and Implementation of Secure Linux operating system and a secure Web system,LiuKeLong/Institute of Software, Chinese Academy of Sciences,19/610
  19. Research on Verification of Secure Operating System Based on Model Checking,ChengLiang/University of Science and Technology of China,3/583
  20. The Research on Virtual Machine Based-on Xen,MengJiangTao/University of Electronic Science and Technology,0/965
  21. Research on Secure Operating System Based on Trusted Computing,LiuZiWen/University of Science and Technology of China,1/543
  22. Study on Identifying Covert Channels for Operating Systems,WangRuiChang/Beijing Jiaotong University,1/101
  23. Towards Access Control Mechanism of Linux Operating System,LiYaoDong/Beijing Jiaotong University,4/276
  24. Research of Interactive Access Control of Operating System,SuYeDong/Zhejiang University,0/65
  25. Research on Access Control in Security Linux,ZuoYing/Chongqing University,0/162
  26. Research on Secure Operating System Testing Methodology,CuiYongZuo/Institute of Software,3/315
  27. Design and Implementation of Identification & Authentication and Access Control in Secure Operating System,WangZuo/Institute of Software,0/183
  28. Design and Implementation of Secure Auditing System in Operating System,ChenHui/Institute of Software,5/373
  29. Research and Implementation of Discretionary Access Control Mechanism in Secure Operating System,SunYaZuo/Institute of Software,5/306
  30. Research and Design of a Linux-compatible Secure Operating System,YiMing/Xi'an University of Electronic Science and Technology,2/225
  31. Implementation of Role-Based Access Control Model in Secure Operating System,LiuWei/Institute of Software,8/306
  32. Research on Network Subsystem of Structured Protection Level Secure Operating System Development,ZhaoZhiKe/Institute of Software,1/79
  33. Identifies the authentication mechanism of a high level of security of the operating system and network services,DongGuangYu/Institute of Software,1/78
  34. Authentication Based on Information Hiding Technology,DuXueTao/People's Liberation Army National Defense University of Science and Technology,0/204
  35. Design and Implementation of the secure operating system real-time audit analysis,TangZuo/Institute of Software,3/207
  36. The Research and Implementation on Access Control Mechanism of Secure Linux,WangLiMei/Beijing University of Technology,1/272
  37. Implementation and Automatic Testing of Security Audit on Linux,ZhangLiang/Beijing Jiaotong University,0/174
  38. Restore confidence in secure operating system design and implementation,LiuLiXie/Zhejiang University,0/143
  39. The Research of Multiple Security Policies’s Framework and Consistency for Linux OS,ZhangLiYun/Shanghai Jiaotong University,6/319
  40. Implementation and Automatic Testing of Mandatory Access Control on Linux,MaMiaoXia/Beijing Jiaotong University,2/183
  41. Implementation and Automatic Testing of Least Privilege Principle on Linux,ZengJie/Beijing Jiaotong University,3/92
  42. Extended implementation of the embedded operating system security mechanisms,JiangWei/University of Electronic Science and Technology,3/250
  43. Study of Intrusion Prevention-in-depth System,WangHu/Hefei University of Technology,3/158
  44. Research and Realization on Dispatching System of Software-bus,WangXueXia/North China Electric Power University (Beijing),3/87
  45. Secure operating system in the Covert Channel,LuLianHao/Zhejiang University,0/170
  46. Design and Implementation of Secure Operating System Testing Toolset,LuYouZuo/PLA Information Engineering University,1/198
  47. Research of Access Control Technology on Role-Based Authorization,ChenJiangYan/National University of Defense Science and Technology,6/178
  48. Research and Implementation on Trusted Authorization Techniques in Secure Operating System,ChengWeiFang/National University of Defense Science and Technology,1/211
  49. Research on Encrypted File System and Trusted Recovery of Secure Operating System,XingChangLiang/Institute of Software,1/201
  50. Virtual Threads Architecture Basd on Network Gateway Operating System,QuHongJun/Huazhong University of Science and Technology,0/63

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile