Evaluating the network security by the Read<sub>W</sub>rite transition model

The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model...

Full description

Saved in:
Bibliographic Details
Main Authors: LU Zhi-yong1, 2, FENG Chao1, YU Hui2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74647017/
Tags: Add Tag
No Tags, Be the first to tag this record!