Check out the new USENIX Web site.

next up previous
Next: Criteria for Evaluation Up: A Comparison of Methods Previous: DTOS Overview

Comparison of Implementations

 

This section of the paper describes each of the methods for changing the security policy in greater detail along with the capabilities and limitations presented by each. However, we begin by describing the criteria against which the four implementation methods are evaluated in Section 5.1. The methods themselves are described in Sections 5.2 through 5.5





Brian Loe
Tue Dec 9 09:16:53 CST 1997